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"})
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000240)={{}, {}, {0x0, 0x0, 0x9}})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  232.452559] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  232.481447] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  232.540422] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.
05:47:08 executing program 3:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00')
ioctl$KVM_RUN(r2, 0x8090ae81, 0x0)

[  232.615856] *** Guest State ***
[  232.622177] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7
[  232.639685] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
05:47:08 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0)
mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
socket$nl_generic(0x10, 0x3, 0x10)
dup(0xffffffffffffffff)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000730000000010"], 0x48}}, 0x0)
sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000008640)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @empty}]}}]}, 0x48}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="240000002e000102000000000000000700000000", @ANYRES32=r5, @ANYBLOB="5c239f"], 0x24}}, 0x4)
sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)

[  232.674520] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  232.702286] CR3 = 0x00000000fffbc000
[  232.727340] RSP = 0x0000000000000000  RIP = 0x000000000000fff0
[  232.740204] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.
[  232.765806] RFLAGS=0x00000002         DR7 = 0x0000000000000400
05:47:08 executing program 4:
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0)
write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="01"], 0x1)
close(r0)
mq_open(0x0, 0x0, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$net_dm(0x0)
sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$batadv(0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)

05:47:08 executing program 0:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00')
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  232.771945] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
[  232.778796] CS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  232.787056] DS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
05:47:08 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00')
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

05:47:09 executing program 3:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00')
ioctl$KVM_RUN(r2, 0x8090ae81, 0x0)

[  232.818151] SS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  232.840438] ES:   sel=0x0009, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  232.899435] FS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  232.960528] GS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  232.969384] kvm [8308]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x4000001d data 0x9c
[  232.973514] kvm [8311]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000004 data 0x6
[  232.987607] GDTR:                           limit=0x00000000, base=0x0000000000000000
[  232.997426] kvm [8308]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000011 data 0x1c
05:47:09 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, 0x0, 0x0)
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0)
tkill(0x0, 0xc)
socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)

[  233.011198] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  233.019528] kvm [8308]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000062 data 0x10
[  233.023098] kvm [8311]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000006 data 0x5
[  233.050043] kvm [8311]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000005 data 0x7
[  233.051333] IDTR:                           limit=0x00000000, base=0x0000000000000000
[  233.072566] kvm [8308]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000089 data 0x63
[  233.079836] kvm [8311]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000007 data 0x4
[  233.097369] kvm [8308]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000043 data 0x88
[  233.109015] TR:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  233.112166] kvm [8311]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000004 data 0x6
[  233.124560] kvm [8308]: vcpu0, guest rIP: 0x14c Hyper-V uhandled wrmsr: 0x40000020 data 0x29
[  233.137905] EFER =     0x0000000000000000  PAT = 0x0007040600070406
[  233.146882] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
05:47:09 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x0)
syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0xffff, {[@fastopen={0x3, 0x2}]}}}}}}}}, 0x0)

05:47:09 executing program 4:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00')
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

05:47:09 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x0, 0xe4cf95bb60253587}, 0xc)
r2 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc)
r3 = socket$nl_route(0x10, 0x3, 0x0)
bind$netlink(r3, &(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc)
r4 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r4, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc)
r5 = socket$nl_route(0x10, 0x3, 0x0)
bind$netlink(r5, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc)
r6 = socket$nl_generic(0x10, 0x3, 0x10)
bind$netlink(r6, &(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc)
r7 = socket$nl_route(0x10, 0x3, 0x0)
bind$netlink(r7, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc)
r8 = socket$netlink(0x10, 0x3, 0x0)
ioctl(r8, 0x1000008912, &(0x7f0000000080)="08418330e91000105ab071")
r9 = socket$nl_audit(0x10, 0x3, 0x9)
bind$netlink(r9, &(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc)
readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/113, 0xcb8}], 0x100000000000000c)
r10 = socket$nl_route(0x10, 0x3, 0x0)
bind$netlink(r10, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc)
r11 = socket$nl_route(0x10, 0x3, 0x0)
bind$netlink(r11, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc)
r12 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r12, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc)
r13 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r13, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x4000000}, 0xc)
r14 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r14, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc)
writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f9cc3f4ff7f4e32f61bcdf1e422000000000100804824cabecc4b38945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff000000000000000000", 0x58}], 0x1)

[  233.168220] Interruptibility = 00000000  ActivityState = 00000000
[  233.177380] *** Host State ***
[  233.187630] RIP = 0xffffffff8116f7cf  RSP = 0xffff888049f0f9b0
[  233.188121] syz-executor.2 (8265) used greatest stack depth: 24256 bytes left
[  233.208041] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  233.246825] FSBase=00007f559fade700 GSBase=ffff8880aea00000 TRBase=fffffe0000003000
05:47:09 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="08418330e91000105ab071")
pipe(&(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$netlink(0x10, 0x3, 0xa)
write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0)

[  233.294038] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000
[  233.304978] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  233.309466] audit: type=1400 audit(1583387229.444:48): avc:  denied  { bind } for  pid=8344 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  233.370266] CR0=0000000080050033 CR3=0000000091770000 CR4=00000000001426f0
[  233.377319] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff866018a0
[  233.384976] syz-executor.2 (8349) used greatest stack depth: 23680 bytes left
[  233.415176] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  233.421348] audit: type=1400 audit(1583387229.484:49): avc:  denied  { audit_read } for  pid=8344 comm="syz-executor.3" capability=37  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1
[  233.452399] *** Control State ***
[  233.455881] PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=000000e2
[  233.468418] EntryControls=0000d1ff ExitControls=002fefff
[  233.484525] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
[  233.501348] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000
[  233.508574] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000
[  233.515538] audit: type=1400 audit(1583387229.514:50): avc:  denied  { create } for  pid=8351 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1
[  233.540340]         reason=80000021 qualification=0000000000000000
[  233.546910] IDTVectoring: info=00000000 errcode=00000000
05:47:09 executing program 1:
socket$inet6(0xa, 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800)
keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(0x0, &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x3)
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0)
write$FUSE_DIRENTPLUS(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="4a100b97f32270dea4eb027c864798"], 0xf)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r1, r2)

05:47:09 executing program 0:
pipe(&(0x7f0000000040)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write(0xffffffffffffffff, &(0x7f0000000140)="fc00000048000702ab092500090005000aab6100170000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc0002", 0x43)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0)

05:47:09 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x0)
syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@fastopen={0x3, 0x2}]}}}}}}}}, 0x0)

05:47:09 executing program 3:
r0 = eventfd(0x0)
writev(r0, &(0x7f0000000a40)=[{&(0x7f00000004c0)="df015be2a1043cce", 0x8}], 0x1)
r1 = gettid()
timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc))
r2 = fcntl$dupfd(r0, 0x0, r0)
r3 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
dup3(r4, r3, 0x0)
write$P9_RLERRORu(r2, &(0x7f0000000080)={0x83, 0x7, 0x0, {{0x76, '-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f'}}}, 0x83)
dup2(r3, r2)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
tkill(r1, 0x1000000000016)

05:47:09 executing program 4:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00')
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  233.558033] audit: type=1400 audit(1583387229.604:51): avc:  denied  { write } for  pid=8351 comm="syz-executor.5" path="socket:[31565]" dev="sockfs" ino=31565 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1
[  233.587237] TSC Offset = 0xffffff80458dd7c0
[  233.596728] TPR Threshold = 0x00
[  233.600376] EPT pointer = 0x00000000956b801e
[  233.604956] Virtual processor ID = 0x0001
05:47:09 executing program 2:
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x305100, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0}}], 0x4000000000001a0, 0x0, 0x0)
socket(0x1a, 0x2, 0xc)
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
preadv(r0, &(0x7f00000017c0), 0x3da, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0xf7, 0x0)

[  233.661442] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  233.734002] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
[  233.750969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
05:47:09 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040))
syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x30]}}}}]})
creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0)

[  233.775198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
[  233.787810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
[  233.810490] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
05:47:10 executing program 4:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0)
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd})

05:47:10 executing program 3:
set_mempolicy(0x40000000004003, &(0x7f00000000c0)=0x8, 0xc2)
r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0)
r1 = dup(r0)
mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x30051, r1, 0x0)

05:47:10 executing program 1:
msgget(0x3, 0x2d5)

[  233.837588] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
[  233.867235] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
[  233.907264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
05:47:10 executing program 3:
ftruncate(0xffffffffffffffff, 0x2081ff)
r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)='cpu&5!!\x00\x00\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\xb6,\xd5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xc4,K\t\x9a\x06\xef+rY\f\xf8,Y$\x9at\xf4\x1a\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f')
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='/dev/loop#\x00')
socket$packet(0x11, 0x0, 0x300)

[  233.949153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
[  233.979375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8385 comm=syz-executor.0
05:47:10 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4066, 0xfe2}], 0x1}}], 0x1, 0x100, 0x0)
setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0)
sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = fcntl$dupfd(r1, 0x0, r0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000cc0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003000000300300009802000000000000000000000000000000000000980200009802000098020000980200009802000003008000000000000000007e000000ffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000000000000000000000d2d8303b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1)

05:47:10 executing program 1:
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4066, 0xfe2}], 0x1}}], 0x1, 0x100, 0x0)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4)
write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = fcntl$dupfd(r1, 0x0, r0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000cc0)=ANY=[@ANYBLOB], 0x1)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, 0x0, &(0x7f0000000100))

05:47:10 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x11, 0x800000003, 0x0)
bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14)
sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000003080)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xffe0}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x20, 0x2, [@TCA_U32_LINK={0x8}, @TCA_U32_SEL={0x14}]}}]}, 0x4c}}, 0x0)

05:47:10 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040))
syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x30]}}}}]})
creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0)

05:47:10 executing program 4:
ftruncate(0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='cpu&5!!\x00\x00\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\xb6,\xd5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xc4,K\t\x9a\x06\xef+rY\f\xf8,Y$\x9at\xf4\x1a\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f')

05:47:10 executing program 3:
r0 = memfd_create(&(0x7f0000000100)='#\x00', 0x0)
write(r0, &(0x7f0000000040)="0600", 0x2)
write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="40000000000025000400000005002c00000000000000280000000000d4040000006ebd451a22dec4c83108206624ca7a4f9d38e16565a16eb68ca2227b28aa5a5282ff43ba0c2b77d868c0757da79288e04d05da00f45ebf460b26bbc8ff1a1aecab81fe6d383a064ea312ba66db4ce4948913585fc97ed370ddb2a3acadc69287b2e940eb689162949f0e102da9edd02e3913d84945b63c470000000000003d5e1e904c000000000000000000dea589cc0a9f9257a7c96663f4eb30be1c4672b8f2"], 0x1c)
sendfile(r0, r0, &(0x7f0000001000), 0xffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10)
r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0)
write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f)
finit_module(0xffffffffffffffff, 0x0, 0x1)

05:47:10 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x4, 0x0, 0x0, 0x2}, 0x10}}, 0x0)

05:47:10 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040))
syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x30]}}}}]})
creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0)

05:47:10 executing program 4:
prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0)
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
dup(r1)
open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x100000}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r2 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4)

05:47:10 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x14, 0x17, 0xa98b1c2e69a9a71b, 0x0, 0x0, {0x6}}, 0x14}}, 0x0)
recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0)

05:47:10 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet(0x2, 0x2, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000010c0)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x1f8, 0x1f8, 0x0, 0x0, 0xd0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "1883"}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420)

05:47:10 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:10 executing program 2:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)}}], 0x1, 0x100, 0x0)
sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = fcntl$dupfd(r1, 0x0, r0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000cc0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003000000300300009802000000000000000000000000000000000000980200009802000098020000980200009802000003008000000000000000007e000000ffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000000000000000000000d2d8303b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1)

[  234.763338] ip6t_REJECT: TCP_RESET illegal for non-tcp
[  234.866375] ISOFS: unable to read i-node block
05:47:11 executing program 1:
prlimit64(0x0, 0xe, 0x0, 0x0)
getpid()
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
pipe(&(0x7f00000000c0))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
getsockname$packet(r1, 0x0, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x100000}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r3 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4)
write(r2, &(0x7f0000000600)="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", 0x100)

05:47:11 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KDENABIO(0xffffffffffffffff, 0x4b36)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffeb000000000000000000000000000000000100000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)

05:47:11 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:11 executing program 3:
r0 = memfd_create(&(0x7f0000000100)='#\x00', 0x0)
write(r0, &(0x7f0000000040)="0600", 0x2)
write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="40000000000025000400000005002c00000000000000280000000000d4040000006ebd451a22dec4c83108206624ca7a4f9d38e16565a16eb68ca2227b28aa5a5282ff43ba0c2b77d868c0757da79288e04d05da00f45ebf460b26bbc8ff1a1aecab81fe6d383a064ea312ba66db4ce4948913585fc97ed370ddb2a3acadc69287b2e940eb689162949f0e102da9edd02e3913d84945b63c470000000000003d5e1e904c000000000000000000dea589cc0a9f9257a7c96663f4eb30be1c4672b8f2"], 0x1c)
sendfile(r0, r0, &(0x7f0000001000), 0xffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10)
r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0)
write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f)
finit_module(0xffffffffffffffff, 0x0, 0x1)

05:47:11 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KDENABIO(0xffffffffffffffff, 0x4b36)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffeb000000000000000000000000000000000100000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)

05:47:11 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  235.187643] ISOFS: unable to read i-node block
05:47:11 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KDENABIO(0xffffffffffffffff, 0x4b36)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffeb000000000000000000000000000000000100000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)

05:47:11 executing program 4:
dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0)
dup(0xffffffffffffffff)
memfd_create(&(0x7f0000000440)='memory.events\x00', 0x0)
ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0)
setreuid(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340))
lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580))
ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000600))
stat(&(0x7f0000000700)='./file0\x00', 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0))

05:47:11 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KDENABIO(0xffffffffffffffff, 0x4b36)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffeb000000000000000000000000000000000100000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110)
ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff)

[  235.489327] ISOFS: unable to read i-node block
05:47:11 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:11 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendmsg$nl_generic(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002980)={0xec4, 0x17, 0xa98b1c2e69a9a71b, 0x0, 0x0, {0x6}, [@nested={0x7d, 0x0, 0x0, 0x1, [@generic="4d951034c8fa4c15b57a05bc192d56f124033cddd853421c28f4fcd1a7a4ee1ce8f9fee97e669710bd463194258cffe5aedc4c29c53e6fd6904aac7b82f4277bb41705f0b548e9e853790f26b5dc043489441a3571f0a5e4bda8a92e02ad7d3899190180fc75ab07c77364b706cde3b136b4c211e19257a226"]}, @generic="ecdbea7318ca877aec9b63399c8e4122000815f016a2c4cc36cba188934bc5c0ba3b86bbafaf78af752218a60844495cde4cef8ee22e0f7b20abf5e4e32d5d029537af5a968d5dcaf2bc612d600ea3585e852d8241156fa2723bf1bde6141c4265d6860790b06643e23659f5601c03a6de61e6c1b18723099f8fd156beb46c0d2315dc660e", @nested={0x199, 0x0, 0x0, 0x1, [@generic="c8233c882a21e3d7e304", @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}, @generic="1c81dcf9b6eac9889b694bcfbb39a48b0fc43dc486d9ee5ddd445dd72f865c7886fe2b277776de206a8148f8434e362807f96fd28769d3f91ace17174855b0fd8c6a8a6191e936e509c0915b143a0badc91a9bc4c147fc1f3f34105b359d98c97661e37820f648626d21f4d8c6a2be9e438d68047083bcbf7f0b7b18f3284f127da035e5274fd3c14b396854fa750a4dc769098061842e9e", @typed={0x4}, @generic="eb0a717c6efd71c579ed532f1659abb14cc7d308e8346a1b735a50c21191aff586e2d044598b89fc6148bbf760cea4341660afece1c543e6c36ea31568a8f4d0fdea9af68398c486067ab2c551c50f8244f188cacb3cf8d29c8c1d69a7c55bd490dbd0825f4bb5aee8b9954e4b1d50b3ef570a166709e2719a972010954e85e46aa1375563648ba4740c8712e964cd5daebd54f241344f61f68ba5b0d26d10333f3c5182a43059a7498ae7206470", @generic="5a6c9fd3551a80729e9426e57da3e7eb804a144b6b895e2d38", @generic="b60bdd2c3fb2e5531f919d8eb59df23070b05fd5"]}, @generic="5053bdc1e56f1c6ed9c253954cbab6164640804647ebacdd322fdd53ecf11cc194739053031a4a4e430d0bb01f72cd8ede6ad2da25e27ded506753aef52557fa", @nested={0xbc9, 0x0, 0x0, 0x1, [@generic="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"]}]}, 0xec4}}, 0x0)
recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0)

05:47:11 executing program 2:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
open_by_handle_at(r0, &(0x7f00000012c0)=ANY=[@ANYBLOB="0c000000214a00cf3c8b1c74b051"], 0x0)

05:47:11 executing program 1:
prlimit64(0x0, 0xe, 0x0, 0x0)
getpid()
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
pipe(&(0x7f00000000c0))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
getsockname$packet(r1, 0x0, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x100000}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r3 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4)
write(r2, &(0x7f0000000600)="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", 0x100)

05:47:11 executing program 3:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040))

05:47:11 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
read$FUSE(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffeb000000000000000000000000000000000100000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110)

05:47:11 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r1)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:11 executing program 4:
dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0)
dup(0xffffffffffffffff)
memfd_create(&(0x7f0000000440)='memory.events\x00', 0x0)
ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0)
setreuid(0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340))
lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580))
ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000600))
stat(&(0x7f0000000700)='./file0\x00', 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0))

05:47:11 executing program 2:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
open_by_handle_at(r0, &(0x7f00000012c0)=ANY=[@ANYBLOB="0c000000214a00cf3c8b1c74b051"], 0x0)

[  235.779926] ISOFS: unable to read i-node block
05:47:12 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)

05:47:12 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0)

05:47:12 executing program 4:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000100)={0xc, 0x0, "01000000"}, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0)

05:47:12 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)

05:47:12 executing program 2:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
open_by_handle_at(r0, &(0x7f00000012c0)=ANY=[@ANYBLOB="0c000000214a00cf3c8b1c74b051"], 0x0)

05:47:12 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4066, 0xfe2}], 0x1}}], 0x1, 0x100, 0x0)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4)
sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = fcntl$dupfd(r1, 0x0, r0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000cc0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003000000300300009802000000000000000000000000000000000000980200009802000098020000980200009802000003008000000000000000007e000000ffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000000000000000000000d2d8303b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)

[  236.051949] ISOFS: unable to read i-node block
05:47:12 executing program 1:
prlimit64(0x0, 0xe, 0x0, 0x0)
getpid()
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
pipe(&(0x7f00000000c0))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
getsockname$packet(r1, 0x0, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x100000}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r3 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4)
write(r2, &(0x7f0000000600)="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", 0x100)

05:47:12 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r1)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffeb000000000000000000000000000000000100000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110)

05:47:12 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r1 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4)

05:47:12 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x11, 0x800000003, 0x0)
bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14)
sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000003080)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xffe0}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0)

[  236.516350] ISOFS: unable to read i-node block
05:47:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffeb000000000000000000000000000000000100000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110)

05:47:12 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r1)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:12 executing program 2:
socket(0x0, 0x80002, 0x0)
dup(0xffffffffffffffff)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
memfd_create(0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
chown(0x0, 0x0, 0x0)
stat(0x0, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)

05:47:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffeb000000000000000000000000000000000100000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110)

05:47:12 executing program 4:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800)
statx(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140))
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0)
write$FUSE_DIRENTPLUS(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="4a100b97f32270dea4eb027c864798beb5107045ad0fa2410e9ccd38595b80bcdf4d3623d25fa35f350b93d195"], 0x2d)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x90)
r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r1, r2)

[  236.784734] ISOFS: unable to read i-node block
05:47:12 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:13 executing program 5:
syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182)
getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0)
dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getpid()
setuid(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getegid()
getegid()
stat(0x0, &(0x7f0000000740))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0)

[  236.908074] kauditd_printk_skb: 10 callbacks suppressed
[  236.908083] audit: type=1804 audit(1583387233.044:62): pid=8640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir109746098/syzkaller.wfNh8h/56/bus" dev="sda1" ino=16603 res=1
[  237.001214] audit: type=1804 audit(1583387233.144:63): pid=8640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir109746098/syzkaller.wfNh8h/56/bus" dev="sda1" ino=16603 res=1
[  237.004619] ISOFS: unable to read i-node block
05:47:13 executing program 1:
prlimit64(0x0, 0xe, 0x0, 0x0)
getpid()
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
pipe(&(0x7f00000000c0))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
getsockname$packet(r1, 0x0, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x100000}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r3 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4)
write(r2, &(0x7f0000000600)="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", 0x100)

05:47:13 executing program 2:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x81}]}, 0xc, 0x0)
ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={<r1=>0x0})
ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140)={r1})
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0)
write$FUSE_DIRENTPLUS(r0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

05:47:13 executing program 4:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800)
statx(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140))
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0)
write$FUSE_DIRENTPLUS(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="4a100b97f32270dea4eb027c864798beb5107045ad0fa2410e9ccd38595b80bcdf4d3623d25fa35f350b93d195"], 0x2d)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x90)
r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r1, r2)

05:47:13 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:13 executing program 5:
syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182)
getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0)
dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$netlink(0x10, 0x3, 0x0)
getpid()
setuid(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000))
getegid()
getegid()
stat(0x0, &(0x7f0000000740))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0)

05:47:13 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r1 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4)

[  237.197334] audit: type=1800 audit(1583387233.334:64): pid=8607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16587 res=0
05:47:13 executing program 2:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r1 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4)

[  237.262971] audit: type=1800 audit(1583387233.404:65): pid=8663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16595 res=0
[  237.352142] audit: type=1804 audit(1583387233.494:66): pid=8665 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir109746098/syzkaller.wfNh8h/57/bus" dev="sda1" ino=16585 res=1
05:47:13 executing program 4:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800)
statx(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140))
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0)
write$FUSE_DIRENTPLUS(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="4a100b97f32270dea4eb027c864798beb5107045ad0fa2410e9ccd38595b80bcdf4d3623d25fa35f350b93d195"], 0x2d)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x90)
r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r1, r2)

05:47:13 executing program 5:
fstatfs(0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
memfd_create(0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0)
newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
msgctl$IPC_SET(0x0, 0x1, 0x0)
msgctl$IPC_SET(0x0, 0x1, 0x0)

[  237.480525] ISOFS: unable to read i-node block
[  237.499562] audit: type=1800 audit(1583387233.534:67): pid=8678 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16607 res=0
05:47:13 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:13 executing program 5:
fstatfs(0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
memfd_create(0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0)
newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
msgctl$IPC_SET(0x0, 0x1, 0x0)
msgctl$IPC_SET(0x0, 0x1, 0x0)

05:47:13 executing program 4:
write(0xffffffffffffffff, 0x0, 0x0)
mknod(&(0x7f0000000140)='./bus\x00', 0xa88, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(0x0, 0x0, 0x0)
socket$inet6(0xa, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_adjtime(0x0, &(0x7f00000000c0))

[  237.606738] audit: type=1800 audit(1583387233.544:68): pid=8676 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16609 res=0
[  237.759007] ISOFS: unable to read i-node block
[  237.765151] audit: type=1804 audit(1583387233.704:69): pid=8686 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir109746098/syzkaller.wfNh8h/58/bus" dev="sda1" ino=16598 res=1
05:47:14 executing program 1:
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800070003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

05:47:14 executing program 5:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:14 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:14 executing program 4:
perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x69, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$P9_RFLUSH(r0, &(0x7f0000000340)={0x7}, 0x7)

05:47:14 executing program 2:
clone(0x2000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000010c0)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x1f8, 0x1f8, 0x0, 0x0, 0xd0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x0, 0x0, 0x42}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "1883"}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420)

05:47:14 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
dup(r0)
open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
prctl$PR_SET_FPEXC(0xc, 0x40000)
mknod(&(0x7f0000000240)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r1 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0)
write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4)

[  238.174425] ip6t_REJECT: TCP_RESET illegal for non-tcp
[  238.199694] ip6t_REJECT: TCP_RESET illegal for non-tcp
05:47:14 executing program 2:

[  238.228208] EXT4-fs (loop1): inodes count not valid: 7340160 vs 128
[  238.229010] ISOFS: unable to read i-node block
[  238.246232] ISOFS: unable to read i-node block
05:47:14 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  238.290501] ISOFS: unable to read i-node block
05:47:14 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f00000002c0))
clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200)=0x1d, 0x4)
exit(0x0)
r1 = socket$inet(0xa, 0x801, 0x84)
connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
listen(r1, 0x8)
r2 = accept4(r1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x0, 0xffff}, 0x8)
r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040))
ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000002c0)=0x400000005)
read(r3, &(0x7f0000001300)=""/5, 0xfff)
r4 = syz_open_pts(r3, 0x0)
r5 = epoll_create1(0x0)
r6 = dup3(r4, r5, 0x0)
ioctl$TCFLSH(r6, 0x540a, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe4)

05:47:14 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f0000000180))
statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0xb06ae4d812fa4c7a, &(0x7f00000002c0))
r0 = socket$pppoe(0x18, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @empty, 'bridge0\x00'}}, 0x1e)
ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x1, 0x4, 0x0, {0x4, @sliced={0xff80, [0x0, 0x5, 0x5, 0x8, 0xec, 0x1bc1, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x8, 0x3, 0xfff, 0x0, 0x0, 0x20, 0x0, 0x0, 0x800, 0x0, 0x98a, 0x5, 0x0, 0x3, 0x2, 0x0, 0x0, 0x85, 0x101, 0x0, 0x701, 0x4, 0x96, 0x2, 0xab, 0x3f, 0x0, 0x4, 0x5]}}, 0x20})
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

05:47:14 executing program 5:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  238.315978] EXT4-fs (loop1): inodes count not valid: 7340160 vs 128
[  238.440698] ISOFS: unable to read i-node block
05:47:14 executing program 1:
r0 = socket$inet6(0xa, 0x800, 0x20)
accept4$inet6(r0, 0x0, 0x0, 0x800)
statx(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0)
keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x400141042, 0x0)
r1 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r1, 0x400, 0x0)
r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x81}]}, 0xc, 0x3)
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0)
write$FUSE_DIRENTPLUS(r2, &(0x7f00000008c0)=ANY=[@ANYBLOB="4a100b97f32270dea4eb027c864798beb5107045ad0fa2410e9ccd38595b80bcdf4d3623d25fa35f350b93d195b7fbe96b77b114fb40aa1ea5f31942815378a956ff6da475b7b6302543badce31633acaa750997de9c8c1fb1551903b61f49fe6e9af72a47083e437c9f6396293918570e000000000000103f839f24a34cf918c6143392493f00000000000000aeba48b16873fdc8cedd750b73f1000000000000000043dafea955634e98e8e0a3a991721e113e36923fdf873ebf1dfb36d132bbb100763fe7a8c7c441a3275737705874f8fb562d90071b6314538a82016fdcc07a8bd15d5552"], 0xe7)
r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x90)
r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r3, r4)

05:47:14 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  238.497640] audit: type=1800 audit(1583387234.634:70): pid=8756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16612 res=0
[  238.681663] audit: type=1804 audit(1583387234.814:71): pid=8765 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir295195572/syzkaller.gVM8Bb/48/bus" dev="sda1" ino=16582 res=1
05:47:14 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  238.748323] ISOFS: unable to read i-node block
05:47:14 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000010c0)=@filter={'filter\x00', 0x50, 0x4, 0x3c0, 0x1f8, 0x1f8, 0x0, 0x0, 0xd0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback, [], [], 'bond_slave_0\x00', 'syzkaller1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@dev, @mcast1, [], [], 'dummy0\x00', 'veth0_to_bond\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@remote, @empty, [], [], 'ip6tnl0\x00', 'ip_vti0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "1883"}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420)

05:47:14 executing program 1:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800)
statx(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0)
keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x400141042, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r0, 0x400, 0x0)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x81}]}, 0xc, 0x3)
ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000100)={<r2=>0x0})
ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140)={r2})
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0)
write$FUSE_DIRENTPLUS(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="4a100b97f32270dea4eb027c864798beb5107045ad0fa2410e9ccd38595b80bcdf4d3623d25fa35f350b93d195b7fbe96b77b114fb40aa1ea5f31942815378a956ff6da475b7b6302543badce31633acaa750997de9c8c1fb1551903b61f49fe6e9af72a47083e437c9f6396293918570e000000000000103f839f24a34cf918c6143392493f00000000000000aeba48b16873fdc8cedd750b73f1000000000000000043dafea955634e98e8e0a3a991721e113e36923fdf873ebf1dfb36d132bbb100763fe7a8c7c441a3275737705874f8fb562d90071b6314538a82016fdcc07a8bd15d5552"], 0xe7)
r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x90)
r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r3, r4)

05:47:15 executing program 1:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800)
statx(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0)
keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x400141042, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r0, 0x400, 0x0)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x81}]}, 0xc, 0x3)
ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000100)={<r2=>0x0})
ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140)={r2})
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0)
write$FUSE_DIRENTPLUS(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="4a100b97f32270dea4eb027c864798beb5107045ad0fa2410e9ccd38595b80bcdf4d3623d25fa35f350b93d195b7fbe96b77b114fb40aa1ea5f31942815378a956ff6da475b7b6302543badce31633acaa750997de9c8c1fb1551903b61f49fe6e9af72a47083e437c9f6396293918570e000000000000103f839f24a34cf918c6143392493f00000000000000aeba48b16873fdc8cedd750b73f1000000000000000043dafea955634e98e8e0a3a991721e113e36923fdf873ebf1dfb36d132bbb100763fe7a8c7c441a3275737705874f8fb562d90071b6314538a82016fdcc07a8bd15d5552"], 0xe7)
r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x90)
r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r3, r4)

[  238.994643] ip6t_REJECT: TCP_RESET illegal for non-tcp
05:47:15 executing program 3:

05:47:15 executing program 5:
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800)
statx(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x0, 0x0, 0x0)
keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x400141042, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r0, 0x400, 0x0)
r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x81}]}, 0xc, 0x3)
ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000100)={<r2=>0x0})
ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000140)={r2})
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0)
write$FUSE_DIRENTPLUS(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="4a100b97f32270dea4eb027c864798beb5107045ad0fa2410e9ccd38595b80bcdf4d3623d25fa35f350b93d195b7fbe96b77b114fb40aa1ea5f31942815378a956ff6da475b7b6302543badce31633acaa750997de9c8c1fb1551903b61f49fe6e9af72a47083e437c9f6396293918570e000000000000103f839f24a34cf918c6143392493f00000000000000aeba48b16873fdc8cedd750b73f1000000000000000043dafea955634e98e8e0a3a991721e113e36923fdf873ebf1dfb36d132bbb100763fe7a8c7c441a3275737705874f8fb562d90071b6314538a82016fdcc07a8bd15d5552"], 0xe7)
r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x90)
r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r3, r4)

05:47:15 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:15 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f00000002c0))
clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200)=0x1d, 0x4)
exit(0x0)
r1 = socket$inet(0xa, 0x801, 0x84)
connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
listen(r1, 0x8)
r2 = accept4(r1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x0, 0xffff}, 0x8)
r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040))
ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000002c0)=0x400000005)
read(r3, &(0x7f0000001300)=""/5, 0xfff)
r4 = syz_open_pts(r3, 0x0)
r5 = epoll_create1(0x0)
r6 = dup3(r4, r5, 0x0)
ioctl$TCFLSH(r6, 0x540a, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe4)

05:47:15 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f0000000180))
statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0xb06ae4d812fa4c7a, &(0x7f00000002c0))
r0 = socket$pppoe(0x18, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @empty, 'bridge0\x00'}}, 0x1e)
ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x1, 0x4, 0x0, {0x4, @sliced={0xff80, [0x0, 0x5, 0x5, 0x8, 0xec, 0x1bc1, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x8, 0x3, 0xfff, 0x0, 0x0, 0x20, 0x0, 0x0, 0x800, 0x0, 0x98a, 0x5, 0x0, 0x3, 0x2, 0x0, 0x0, 0x85, 0x101, 0x0, 0x701, 0x4, 0x96, 0x2, 0xab, 0x3f, 0x0, 0x4, 0x5]}}, 0x20})
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

05:47:15 executing program 1:

05:47:15 executing program 5:

05:47:15 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:15 executing program 3:

05:47:15 executing program 1:

05:47:15 executing program 5:

05:47:15 executing program 3:

05:47:15 executing program 1:

05:47:15 executing program 5:

05:47:15 executing program 3:

05:47:16 executing program 4:

05:47:16 executing program 1:

05:47:16 executing program 0:
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:16 executing program 5:

05:47:16 executing program 3:

05:47:16 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f0000000180))
statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0xb06ae4d812fa4c7a, &(0x7f00000002c0))
r0 = socket$pppoe(0x18, 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @empty, 'bridge0\x00'}}, 0x1e)
ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000003c0)={0x1, 0x4, 0x0, {0x4, @sliced={0xff80, [0x0, 0x5, 0x5, 0x8, 0xec, 0x1bc1, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x8, 0x3, 0xfff, 0x0, 0x0, 0x20, 0x0, 0x0, 0x800, 0x0, 0x98a, 0x5, 0x0, 0x3, 0x2, 0x0, 0x0, 0x85, 0x101, 0x0, 0x701, 0x4, 0x96, 0x2, 0xab, 0x3f, 0x0, 0x4, 0x5]}}, 0x20})
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

05:47:16 executing program 3:

05:47:16 executing program 5:

05:47:16 executing program 4:

05:47:16 executing program 0:
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:16 executing program 1:

05:47:16 executing program 5:

05:47:16 executing program 4:

05:47:16 executing program 3:

05:47:16 executing program 0:
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:16 executing program 1:

05:47:16 executing program 5:

05:47:16 executing program 2:

05:47:16 executing program 4:

05:47:16 executing program 3:

05:47:16 executing program 0:
syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:16 executing program 1:

05:47:16 executing program 5:

05:47:16 executing program 3:

05:47:16 executing program 5:

05:47:16 executing program 1:

05:47:16 executing program 4:

05:47:16 executing program 2:

05:47:16 executing program 5:

05:47:16 executing program 4:

05:47:16 executing program 1:

05:47:16 executing program 3:

05:47:16 executing program 0:
syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:16 executing program 2:

05:47:16 executing program 3:

05:47:16 executing program 5:

05:47:16 executing program 1:

05:47:16 executing program 2:

05:47:16 executing program 4:

05:47:16 executing program 3:

05:47:16 executing program 5:

05:47:16 executing program 0:
syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:16 executing program 2:

05:47:16 executing program 1:

05:47:16 executing program 4:

05:47:16 executing program 5:

05:47:16 executing program 3:

05:47:17 executing program 4:

05:47:17 executing program 1:

05:47:17 executing program 2:

05:47:17 executing program 5:

05:47:17 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', 0x0, 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:17 executing program 1:

05:47:17 executing program 4:

05:47:17 executing program 3:

05:47:17 executing program 2:

05:47:17 executing program 5:

05:47:17 executing program 1:

05:47:17 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', 0x0, 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:17 executing program 3:

05:47:17 executing program 4:

05:47:17 executing program 2:

05:47:17 executing program 5:

05:47:17 executing program 3:

05:47:17 executing program 1:

05:47:17 executing program 5:

05:47:17 executing program 4:

05:47:17 executing program 2:

05:47:17 executing program 3:

05:47:17 executing program 1:

05:47:17 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', 0x0, 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:17 executing program 4:

05:47:17 executing program 5:

05:47:17 executing program 2:

05:47:17 executing program 3:

05:47:17 executing program 1:

05:47:17 executing program 4:

05:47:17 executing program 5:

05:47:17 executing program 4:

05:47:17 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:17 executing program 1:

05:47:17 executing program 3:

05:47:17 executing program 2:

05:47:17 executing program 5:

05:47:17 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
r0 = getuid()
syz_mount_image$afs(&(0x7f0000000040)='afs\x00', &(0x7f0000000140)='.//ile0\x00', 0xfff, 0x2, &(0x7f0000000400)=[{&(0x7f0000000200)="7fcb71353ea6d46b7f52fc460f30ed98237b2295baa2806ea48a62f1c2d33601357dcb5c75b8c3969ee8c8fa66b6c9ce98d40adaedfad29bc3fd0e3c95a4ec56282de47d8f85fbdafc2992868ab74e565f5903235fbcb5d55cc133f32e03e96bdfa27fbae950685253e9b039c9860eeb43299cfa49309de9a9bcce44847bc7d5e6fbe55a5ef478cd79b4b4b6524c259a88b06e85179ef2bb72753a8d98dce9f08d2a0e3960555b73d1a6ac1cc7f0f567712a768174a36a4df601", 0xba, 0x4}, {&(0x7f0000000380)="d0146acb1cd50b3df761cbe2a12b3ddf23974d119e6e069d8b1f3fa1860fc98a3bd2c2c4121020e0f06321368f47ac016022251ab5430c563d7e724b1916b2ed89", 0x41, 0x5}], 0x208000, &(0x7f0000000500)={[{@source={'source', 0x3d, 'overlay\x00'}}, {@flock_write='flock=write'}, {@flock_strict='flock=strict'}, {@autocell='autocell'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x31, 0x0, 0x34, 0x37, 0x39, 0x62, 0x30], 0x2d, [0x63, 0x33, 0x39, 0x33], 0x2d, [0x66, 0x0, 0x33, 0x64], 0x2d, [0x39, 0x32, 0x62, 0x33], 0x2d, [0x65, 0x64, 0x32, 0x63, 0x61, 0x64, 0x37, 0x30]}}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@subj_type={'subj_type', 0x3d, '/dev/vhost-net\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x38, 0x34, 0x31, 0x61, 0x38, 0x39], 0x2d, [0x32, 0x32, 0x30, 0x62], 0x2d, [0x36, 0x37, 0x39, 0x32], 0x2d, [0x30, 0x34, 0x2, 0x64], 0x2d, [0x2, 0x31, 0x32, 0x61, 0x36, 0x61, 0x33, 0x34]}}}]})
ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, 0x0)
lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x2}, [{0x2, 0x2}, {}], {}, [], {0x10, 0x5}, {0x20, 0x1}}, 0x34, 0x2)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1'])
mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0)
socket(0x0, 0x0, 0x1f)
getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000100))
remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x0, 0x10)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0)
renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00')

[  241.540302] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64
05:47:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
r0 = getuid()
syz_mount_image$afs(&(0x7f0000000040)='afs\x00', &(0x7f0000000140)='.//ile0\x00', 0xfff, 0x2, &(0x7f0000000400)=[{&(0x7f0000000200)="7fcb71353ea6d46b7f52fc460f30ed98237b2295baa2806ea48a62f1c2d33601357dcb5c75b8c3969ee8c8fa66b6c9ce98d40adaedfad29bc3fd0e3c95a4ec56282de47d8f85fbdafc2992868ab74e565f5903235fbcb5d55cc133f32e03e96bdfa27fbae950685253e9b039c9860eeb43299cfa49309de9a9bcce44847bc7d5e6fbe55a5ef478cd79b4b4b6524c259a88b06e85179ef2bb72753a8d98dce9f08d2a0e3960555b73d1a6ac1cc7f0f567712a768174a36a4df601", 0xba, 0x4}, {&(0x7f0000000380)="d0146acb1cd50b3df761cbe2a12b3ddf23974d119e6e069d8b1f3fa1860fc98a3bd2c2c4121020e0f06321368f47ac016022251ab5430c563d7e724b1916b2ed89", 0x41, 0x5}], 0x208000, &(0x7f0000000500)={[{@source={'source', 0x3d, 'overlay\x00'}}, {@flock_write='flock=write'}, {@flock_strict='flock=strict'}, {@autocell='autocell'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x31, 0x0, 0x34, 0x37, 0x39, 0x62, 0x30], 0x2d, [0x63, 0x33, 0x39, 0x33], 0x2d, [0x66, 0x0, 0x33, 0x64], 0x2d, [0x39, 0x32, 0x62, 0x33], 0x2d, [0x65, 0x64, 0x32, 0x63, 0x61, 0x64, 0x37, 0x30]}}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@subj_type={'subj_type', 0x3d, '/dev/vhost-net\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x38, 0x34, 0x31, 0x61, 0x38, 0x39], 0x2d, [0x32, 0x32, 0x30, 0x62], 0x2d, [0x36, 0x37, 0x39, 0x32], 0x2d, [0x30, 0x34, 0x2, 0x64], 0x2d, [0x2, 0x31, 0x32, 0x61, 0x36, 0x61, 0x33, 0x34]}}}]})
ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, 0x0)
lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x2}, [{0x2, 0x2}, {}], {}, [], {0x10, 0x5}, {0x20, 0x1}}, 0x34, 0x2)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1'])
mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0)
socket(0x0, 0x0, 0x1f)
getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000100))
remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x0, 0x10)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0)
renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00')

05:47:17 executing program 1:
syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x0)
syz_open_dev$sndpcmc(0x0, 0x0, 0x0)
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00')
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300))
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r1=>0x0})
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x80000, 0x0)
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff})
r4 = dup2(r3, r2)
dup(r2)
setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f00000002c0), 0x4)
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

05:47:17 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x6}, 0x10}, 0x78)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28)

05:47:17 executing program 5:
pipe(&(0x7f0000000200)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000600), 0x20000000, &(0x7f0000000680))
socket$inet(0x10, 0x2, 0x0)
write$dsp(r0, &(0x7f00000001c0)="64ea4993328bcc2d131707e46844d513095f639a0ebbd10ba8", 0x19)
r5 = socket$inet(0x2, 0x2, 0x0)
r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r7=>0xffffffffffffffff})
dup2(r7, r6)
setsockopt$inet_msfilter(r5, 0x0, 0x8, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r6, @ANYBLOB="df1af4b02d5260267d00e6d4703371ee74aafc194968b2fb724eaca8e8d6063c81a96a1cad9c4a49b05b0b28a2ad290519f3bf812c9a39c33111f48f7f6b0f021a247643ffaa22b8ccc0349564e23a514dd3adadec189ea7f9fd8ba0327aca0039f7c63c8d44ac9daa414b75228b791ec02b080828e8cdd95737aa02c1adaa6a1b3c1050cd3c050f656f7e1c06784aac7d70b2ae492d63b1c8ce206b601c740ee362b765f0fb7f6bf107b340875eeccbdaf0019e0beb60aaeab1273452c29e7a134e5da630b660bced68b00a0dd5acbb610bd03102cc0725a013bf8a21bdda8c32ee201fa70e"], 0x2)
getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={<r8=>0x0, @local, @local}, &(0x7f0000000080)=0xc)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="180000001500010000000000e974c451c58363ab612bc6878b47537765e56ebeeb9d94e69d38cd12ad5be5e0b141c9028e298978daf4253e2300b44de8508747d9238372a42958ca0252659c90d671ce8df29fabed3357f28caf1a49cb8fb7fe14df24486c91f88928f6c2b067316451faba6541c340bd588de958f239b34ee6bd6310", @ANYRES32=r8], 0x18}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0)

05:47:17 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  241.745620] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64
05:47:17 executing program 2:
r0 = creat(0x0, 0x0)
ioctl$KDFONTOP_SET(r0, 0x4b72, 0x0)
readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/40, 0x28)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r2, 0x0, r2)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
dup2(r4, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x0, r1, 0x3)
r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00')
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x5, 0x4)
r6 = socket$inet_udp(0x2, 0x2, 0x0)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r7, 0x0, r7)
r8 = syz_open_dev$ttys(0xc, 0x2, 0x1)
splice(r7, &(0x7f00000001c0)=0x1, r8, &(0x7f0000000200)=0x6, 0x59, 0x4)
ioctl$void(0xffffffffffffffff, 0x5451)
setsockopt$inet_mreqn(r6, 0x0, 0x19, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc)
getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, <r9=>0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000002c0)=0x80)
setsockopt$bt_hci_HCI_FILTER(r9, 0x0, 0x2, &(0x7f0000000300)={0xfffffff7, [0x0, 0x9], 0x7}, 0x10)
r10 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0)
creat(0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sendfile(r10, r5, 0x0, 0x20000000000000d8)

05:47:17 executing program 5:
r0 = memfd_create(&(0x7f0000000180)='systemsystemnodev\x00', 0x0)
r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0)
r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0)
sendfile(r1, r2, 0x0, 0xffffffffffffff00)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1100)
r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r6=>0xffffffffffffffff})
dup2(r6, r5)
getsockopt$bt_BT_FLUSHABLE(r6, 0x112, 0x8, &(0x7f0000000000)=0xffff8000, &(0x7f0000000080)=0x4)

05:47:18 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:18 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
r0 = getuid()
syz_mount_image$afs(&(0x7f0000000040)='afs\x00', &(0x7f0000000140)='.//ile0\x00', 0xfff, 0x2, &(0x7f0000000400)=[{&(0x7f0000000200)="7fcb71353ea6d46b7f52fc460f30ed98237b2295baa2806ea48a62f1c2d33601357dcb5c75b8c3969ee8c8fa66b6c9ce98d40adaedfad29bc3fd0e3c95a4ec56282de47d8f85fbdafc2992868ab74e565f5903235fbcb5d55cc133f32e03e96bdfa27fbae950685253e9b039c9860eeb43299cfa49309de9a9bcce44847bc7d5e6fbe55a5ef478cd79b4b4b6524c259a88b06e85179ef2bb72753a8d98dce9f08d2a0e3960555b73d1a6ac1cc7f0f567712a768174a36a4df601", 0xba, 0x4}, {&(0x7f0000000380)="d0146acb1cd50b3df761cbe2a12b3ddf23974d119e6e069d8b1f3fa1860fc98a3bd2c2c4121020e0f06321368f47ac016022251ab5430c563d7e724b1916b2ed89", 0x41, 0x5}], 0x208000, &(0x7f0000000500)={[{@source={'source', 0x3d, 'overlay\x00'}}, {@flock_write='flock=write'}, {@flock_strict='flock=strict'}, {@autocell='autocell'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x31, 0x0, 0x34, 0x37, 0x39, 0x62, 0x30], 0x2d, [0x63, 0x33, 0x39, 0x33], 0x2d, [0x66, 0x0, 0x33, 0x64], 0x2d, [0x39, 0x32, 0x62, 0x33], 0x2d, [0x65, 0x64, 0x32, 0x63, 0x61, 0x64, 0x37, 0x30]}}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@subj_type={'subj_type', 0x3d, '/dev/vhost-net\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x38, 0x34, 0x31, 0x61, 0x38, 0x39], 0x2d, [0x32, 0x32, 0x30, 0x62], 0x2d, [0x36, 0x37, 0x39, 0x32], 0x2d, [0x30, 0x34, 0x2, 0x64], 0x2d, [0x2, 0x31, 0x32, 0x61, 0x36, 0x61, 0x33, 0x34]}}}]})
ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, 0x0)
lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x2}, [{0x2, 0x2}, {}], {}, [], {0x10, 0x5}, {0x20, 0x1}}, 0x34, 0x2)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1'])
mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0)
socket(0x0, 0x0, 0x1f)
getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000100))
remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x0, 0x10)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0)
renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00')

05:47:18 executing program 3:
socket$inet_tcp(0x2, 0x1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='memory.events\x00', 0x0, 0x0)
bind$inet(r0, &(0x7f0000000900)={0x2, 0x0, @rand_addr=0x7fc00000}, 0x10)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet(r2, &(0x7f00000007c0)="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", 0x10a, 0x20008005, &(0x7f0000000100)={0x2, 0x4e22}, 0x10)
r3 = socket(0x10, 0x803, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000340)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8)
sendmsg$nl_route(r3, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c001a005e040000", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x82)
ioctl$TCXONC(r4, 0x540a, 0x2)
r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/enforce\x00', 0x30000, 0x0)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba)
r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x402, 0x0)
setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="e00000027f000001eaff000005000000ac1e0001e00000017fed5bfac29d5172c200066bf4f03686ef7936d35e5241af9e76ac8547acdab72aa970eab08b805871e1e21595b31404c71c6057d79f9dc0bbb57311616d00f00200b2a775c0b7f4ebabcc278a14bba3d51600210bb6e882e37e7e2bc65062c5744e41f904920ed33cb8ab87ba4f56e8e105ecc482423f53e205d9d142bd1f2a9fa97ff49e74aa18f0e2de60f9097480afe9abb62779f5ed9ffac19d4c1a0535e5420f63ef7e6b8eb07fecbd66d231db86f84c053b2915e31269b73316d0696b7dcc064d2c41a908c29fd18185a61f6d67a55a8b071a"], 0x24)
openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/commit_pending_bools\x00', 0x1, 0x0)
r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r9, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r10 = socket$netlink(0x10, 0x3, 0x0)
openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x309000, 0x0)
r11 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r11, 0x4, 0x3fffe)
io_setup(0x48, &(0x7f0000000400)=<r12=>0x0)
ioctl$USBDEVFS_CONNECTINFO(r6, 0x40085511, &(0x7f00000004c0))
io_submit(r12, 0x200002f4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r11, &(0x7f0000000000), 0xfffffd63}])
r13 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r14=>0xffffffffffffffff})
dup2(r14, r13)
ioctl$VIDIOC_PREPARE_BUF(r14, 0xc058565d, &(0x7f00000005c0)={0xa3, 0xa, 0x4, 0x0, 0x7, {0x0, 0x7530}, {0x2, 0xb, 0x7, 0x3c, 0x5, 0x0, "9c6333b8"}, 0xfff, 0x4, @offset=0x5, 0x1, 0x0, <r15=>r1})
ioctl$sock_bt_hci(r15, 0x400448e4, &(0x7f0000000240)="6f7e1ca17b6cdf0d3fe60d5d5e7e02ad2028751119c9ab4be12fc8f8ee241f5c3b51459dd611a07de6fda883758775a2ad53357644dbc81b5f8b26e4b9fe6fbb5aed076984b0049f2315c468e15bae9ee3c6e17988020bab976e659e0f8d3dc4fc59e687278a9b941e845fb096564a46dfda4a54f00e5dca4181d7d9540dceeb14d161c72df6c6cd05b32b906c2202676728ea572f981bf8e56663a4847898f991621707c4406d0f15d873dc1def070271742567b368dc5f5bac0347c88d47f26346c3a5a4b1a708ea8f43")
r16 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="7c000000100b1fff0cbd7000000095418500000089ecfccbcd42955d531caeea893f40fcfd4a77db885b9299964d54", @ANYRES32=0x0, @ANYBLOB="0000000000000000540012800b00010067726574617000004400028008000100", @ANYRES32=0x0, @ANYBLOB="08000700ac141400080005006d04000005000a00000000000600020009000000050009003f000000050017000100000006000f000008000008000a00", @ANYRES16=r4, @ANYBLOB], 0x7}}, 0x20000010)

05:47:18 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x2001, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
waitid(0x0, 0x0, 0x0, 0x1000000, 0x0)
getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4)
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
pipe(&(0x7f0000000840)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
modify_ldt$write(0x1, 0x0, 0x0)
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000), 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20001, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x4000, 0x0)
write$P9_RLINK(r2, 0x0, 0x0)
getxattr(0x0, 0x0, 0x0, 0xfffffffffffffe39)
gettid()
gettid()
creat(0x0, 0x0)
r4 = getpid()
sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
sendfile(r1, 0xffffffffffffffff, &(0x7f0000000140)=0x2c, 0x7f)
sched_setattr(r4, &(0x7f0000000100)={0x38, 0x0, 0x0, 0xe282, 0x7, 0x0, 0x7, 0x1f, 0x1, 0xfffffffa}, 0x0)
getpid()
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
dup(0xffffffffffffffff)
bind$inet6(r5, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r6 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0)
ftruncate(r6, 0x10099b7)
sendfile(r5, r6, 0x0, 0x8000fffffffe)

05:47:18 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  241.983415] isofs_fill_super: bread failed, dev=loop0, iso_blknum=32, block=64
[  242.085821] ISOFS: Unable to identify CD-ROM format.
05:47:18 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  242.252205] ISOFS: Unable to identify CD-ROM format.
05:47:18 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:18 executing program 2:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = creat(0x0, 0x0)
r2 = socket$inet6(0xa, 0x3, 0x87)
close(0xffffffffffffffff)
r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
waitid(0x1, r0, &(0x7f0000000180), 0x8, &(0x7f00000002c0))
setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x3, @loopback, 0x3}}}, 0x90)
ioctl$GIO_FONT(r1, 0x4b60, 0x0)
pipe(&(0x7f0000000380)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
fcntl$setpipe(r5, 0x407, 0x0)
write(r5, &(0x7f0000000340), 0x41395527)
r6 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x80)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r6, 0x29, 0xd3, 0x0, 0x0)
ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000003c0)=""/232)
vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
pipe(0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/igmp\x00')
r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0)
dup(0xffffffffffffffff)
sendfile(r8, r7, 0x0, 0x20000000000000d8)

[  242.564453] ISOFS: Unable to identify CD-ROM format.
05:47:18 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:19 executing program 5:
socket$nl_netfilter(0x10, 0x3, 0xc)
open(&(0x7f0000000000)='./bus\x00', 0x680, 0x5)
openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0)
ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000080)={0x2d})
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
write$FUSE_DIRENT(r1, &(0x7f0000000180)={0xf0, 0xffffffffffffffda, 0x8, [{0x6, 0x5, 0xa, 0x7, '\'em1wlan0@'}, {0x6, 0x42d, 0x25, 0x3, 'wlan1md5sumselinuxtrustedppp1&[vmnet0'}, {0x3, 0xc570, 0xa, 0x2, '/dev/cuse\x00'}, {0x2, 0x9f38a00000000000, 0xa, 0x6, '/dev/cuse\x00'}, {0x0, 0x1, 0xc, 0x7fff, 'selinux:self'}]}, 0xf0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r2, 0x0, r2)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x3)

05:47:19 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  242.959259] isofs_fill_super: root inode is not a directory. Corrupted media?
[  242.990524] selinux_nlmsg_perm: 69 callbacks suppressed
[  242.990534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1118 sclass=netlink_route_socket pig=9118 comm=syz-executor.3
05:47:19 executing program 5:
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='ff=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00'])
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
r2 = socket(0xa, 0x5, 0x0)
setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={<r3=>0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc)
r4 = getuid()
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001c40)={{{@in6=@local, @in6=@dev={0xfe, 0x80, [], 0x2e}, 0x4e22, 0x8, 0x4e23, 0x3, 0xf, 0x0, 0x0, 0xff, r3, r4}, {0x8000, 0xfffffffffffffffb, 0x1000, 0x6, 0x9, 0xfffffffffffffbee, 0x2, 0x4}, {0x10001, 0x3, 0x3, 0x7}, 0x400, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in6=@mcast2, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x1, 0x0, 0x8, 0x3, 0x80000000, 0xfff}}, 0xe8)
r5 = socket$inet6_sctp(0xa, 0x1, 0x84)
r6 = socket(0xa, 0x5, 0x0)
setsockopt$inet_int(r6, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={<r7=>0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc)
r8 = getuid()
setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000001c40)={{{@in6=@local, @in6=@dev={0xfe, 0x80, [], 0x2e}, 0x4e22, 0x8, 0x4e23, 0x3, 0xf, 0x0, 0x0, 0xff, r7, r8}, {0x8000, 0xfffffffffffffffb, 0x1000, 0x6, 0x9, 0xfffffffffffffbee, 0x2, 0x4}, {0x10001, 0x3, 0x3, 0x7}, 0x400, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in6=@mcast2, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x1, 0x0, 0x8, 0x3, 0x80000000, 0xfff}}, 0xe8)
r9 = getegid()
stat(0x0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
setresgid(0x0, r10, 0x0)
stat(0x0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, <r11=>0x0})
setresgid(0x0, r11, 0x0)
stat(0x0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, <r12=>0x0})
setresgid(0x0, r12, 0x0)
setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {0x1, 0x2}, [{0x2, 0x6, r4}, {0x2, 0x3, r8}], {}, [{0x8, 0x3608ffe59d03ee40, r9}, {0x8, 0x6, r10}, {0x8, 0x3, r11}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x2, r12}], {0x10, 0x1}}, 0x5c, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
stat(&(0x7f0000000500)='./file0\x00', 0x0)

[  243.158103] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:19 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:19 executing program 4:
accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000400)=0x1c, 0x80800)
sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x24, 0x1, 0x4, 0x0, 0x0, 0x0, {}, [@NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}}, 0x0)
r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x20400, 0x8)
getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003600)={{{@in=@dev, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000003700)=0xe4)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0)
ioctl$sock_proto_private(0xffffffffffffffff, 0x89e4, &(0x7f0000000500)="128f5e959ae6555be33c1b1f4daf9791c728a92ac0fd73105375374a8245c6bc194383ccd0fd1d2d490e81c595d77bdf679040e6e34a8a60bd9889237a86654dd56874c2e6091a130289f30dcd4c85d3dc34196bca8e0b8880bdf3")
bind$inet(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt6_stats\x00')
clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendto$inet(0xffffffffffffffff, &(0x7f00000002c0)="34f266a4dd67440771d533f75e875c091213deabe77369eff5db91af75819ae0b92f9e7aab5fb711eabdf58723e99f6153c4e177", 0x34, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
r1 = getpid()
tkill(r1, 0x9)
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x78, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x24, 0x1a, 0x0, 0x1, [@AF_INET={0x20, 0x2, 0x0, 0x1, {0x1c, 0x1, 0x0, 0x1, [{0x8, 0x4}, {0x8, 0x1}, {0x8, 0x9, 0x0, 0x0, 0x7}]}}]}, @IFLA_GROUP={0x8}, @IFLA_GSO_MAX_SIZE={0x8}, @IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x23ac85fd}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}]}, 0x78}}, 0x0)

05:47:19 executing program 5:
pipe(&(0x7f0000000340)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket(0x8, 0x80002, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100000001"], 0x1}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

05:47:19 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
pipe(&(0x7f0000000200))
r2 = dup2(r1, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
pipe2(&(0x7f0000000040), 0xe91a35b93995bb28)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

05:47:19 executing program 2:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = creat(0x0, 0x0)
r2 = socket$inet6(0xa, 0x3, 0x87)
close(0xffffffffffffffff)
r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
waitid(0x1, r0, &(0x7f0000000180), 0x8, &(0x7f00000002c0))
setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x3, @loopback, 0x3}}}, 0x90)
ioctl$GIO_FONT(r1, 0x4b60, 0x0)
pipe(&(0x7f0000000380)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
fcntl$setpipe(r5, 0x407, 0x0)
write(r5, &(0x7f0000000340), 0x41395527)
r6 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x80)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r6, 0x29, 0xd3, 0x0, 0x0)
ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000003c0)=""/232)
vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
pipe(0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/igmp\x00')
r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0)
dup(0xffffffffffffffff)
sendfile(r8, r7, 0x0, 0x20000000000000d8)

[  243.398224] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:19 executing program 4:
accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000400)=0x1c, 0x80800)
sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x24, 0x1, 0x4, 0x0, 0x0, 0x0, {}, [@NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}}, 0x0)
r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x20400, 0x8)
getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003600)={{{@in=@dev, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000003700)=0xe4)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0)
ioctl$sock_proto_private(0xffffffffffffffff, 0x89e4, &(0x7f0000000500)="128f5e959ae6555be33c1b1f4daf9791c728a92ac0fd73105375374a8245c6bc194383ccd0fd1d2d490e81c595d77bdf679040e6e34a8a60bd9889237a86654dd56874c2e6091a130289f30dcd4c85d3dc34196bca8e0b8880bdf3")
bind$inet(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt6_stats\x00')
clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendto$inet(0xffffffffffffffff, &(0x7f00000002c0)="34f266a4dd67440771d533f75e875c091213deabe77369eff5db91af75819ae0b92f9e7aab5fb711eabdf58723e99f6153c4e177", 0x34, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
r1 = getpid()
tkill(r1, 0x9)
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x78, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x24, 0x1a, 0x0, 0x1, [@AF_INET={0x20, 0x2, 0x0, 0x1, {0x1c, 0x1, 0x0, 0x1, [{0x8, 0x4}, {0x8, 0x1}, {0x8, 0x9, 0x0, 0x0, 0x7}]}}]}, @IFLA_GROUP={0x8}, @IFLA_GSO_MAX_SIZE={0x8}, @IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x23ac85fd}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}]}, 0x78}}, 0x0)

05:47:19 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {0x0, 0x0, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  243.494592] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  243.534432] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock
[  243.567069] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock
05:47:19 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {0x0, 0x0, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  243.757077] isofs_fill_super: root inode is not a directory. Corrupted media?
[  243.781380] EXT4-fs error (device loop3): ext4_iget:4727: inode #2: comm syz-executor.3: root inode unallocated
[  243.794721] EXT4-fs (loop3): get root inode failed
05:47:20 executing program 4:
pipe(&(0x7f0000000040)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = socket$inet6(0x10, 0x3, 0x0)
sendto$inet6(r5, &(0x7f0000000040)="23000000220009bb00b9409b849ac00a00e3b8a98623ff2a09a6c5b01109e3ecabbe82", 0x23, 0x0, 0x0, 0x0)
recvfrom$inet6(r5, &(0x7f0000000000)=""/233, 0xe9, 0x0, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f", 0x7, 0x0, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="27000000219f3d1efab0c65ed0809ae6fede52acf74fe1a28b2a2188e481bb0586c526df02ac4e10baf37df3c88cf21d894cfa4254b295275d1e", 0x3a, 0x80008c0, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

[  243.839235] EXT4-fs (loop3): mount failed
[  243.915154] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:20 executing program 3:
r0 = getpid()
prlimit64(r0, 0xe, &(0x7f0000000280)={0x9, 0x1}, 0x0)
r1 = getpid()
sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x100, 0x5, 0x1}, 0x0)
r2 = socket$key(0xf, 0x3, 0x2)
recvmmsg(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0)
pipe(&(0x7f0000000940)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r5=>0xffffffffffffffff})
dup2(r5, r4)
r6 = dup(r4)
vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x14000, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
write$UHID_INPUT(r7, &(0x7f0000000980), 0x10a9)
r8 = syz_open_procfs(0x0, 0x0)
sendmsg$NL80211_CMD_NEW_MPATH(r7, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x200088d0)
bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0)
r9 = creat(&(0x7f0000000040)='./bus\x00', 0xa)
fcntl$setstatus(r9, 0x4, 0x46000)
lseek(r9, 0x4200, 0x0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x1ff, &(0x7f00000004c0))
r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r10)
open(&(0x7f00000002c0)='./bus\x00', 0x163042, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0)
r11 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4)
sendfile(r9, r11, 0x0, 0x8400fffffffb)
sendfile(r7, r7, &(0x7f0000000100), 0x8080fffffffe)

05:47:20 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {0x0, 0x0, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  243.968260] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
[  243.999540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
[  244.016381] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
[  244.028813] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
[  244.046164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
[  244.065466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
[  244.086748] kauditd_printk_skb: 5 callbacks suppressed
[  244.086756] audit: type=1804 audit(1583387240.224:77): pid=9192 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir797178729/syzkaller.cwcNUl/71/bus" dev="sda1" ino=16632 res=1
[  244.124789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
[  244.139340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
[  244.156728] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:20 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280), 0x0, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:20 executing program 5:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {0x0, 0x0, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  244.176377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9185 comm=syz-executor.4
05:47:20 executing program 2:
r0 = socket$inet(0x10, 0x80002, 0x0)
syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00')
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0)
write$P9_RSYMLINK(r1, &(0x7f00000000c0)={0x14, 0x11, 0x2, {0x2, 0x1}}, 0x14)
sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000440)="47d5da143aad6a22850cd2212a2bb360b1bd9158df6743e4062084211a4c3a6713fde5206260a1ae", 0x28}, {&(0x7f0000000480)="295f7b5f4fe46aa5f962865e58cc2696e29cdbde7ec95cda65cef36c993d3d2171ca3842a0b82a70add6ccaa652f4f22b0e40d4d599252527b54c7d09f99f7", 0x3f}, {&(0x7f00000004c0)="8594657cb59154cdfc505db2c475c26b37119fe7690722ab6ee8266d8893a55925f917e314bab5b5306b7f871da8d1b558b5d9722314698cbedc08326c34865796018e0cfb1588a6b7d6421242ed7188e6eb8f2273c95546d2ae27a48eaf21d170b736fc1a9f60510bc2855eb3655b8e92ebda4cab507da21ac8382257ce0d4d801bf6dbcc24aad6344029c0e417dec9ea71be2ffbfec5a832a09380b578712dcbc5a4c88a6d6ad74c1072b88e67e5f2e2c8ec649fbe340ddec2ec92b78f", 0xbe}, {&(0x7f0000000580)="0a7b9f2165c86a6de53d1367f7b7b0886f9b9bf569f70eb451f1156c971f37dbe71c454e03530b011ced", 0x2a}, {&(0x7f00000005c0)="ea404d32b128e70cda8c394a42de535a801d810859baf6eef37c8a5cbae76057a0d0486303588203ead9588c2d176f994d911addd47378e9dfb6f461d1abda2eb6d38a63881d94f93f576728b0906b6f12fe54be66135c8527b834c428de78ecac1d5af48856f0ce960f47ba1fb8f36bca09b1ea55649226247192fe499a5d8d6d9e29dfd82ed491919f5811a63cb8a21d8e367c99e79e0e34db309ab4097886607c6b40d92e26c628d4dea27de80ae34a3e624f517bb2fb1c16f185567a360ca7ad823a1347c9d32d7ec9f506584c4a08aa09ca13848a849a4fdbaf072dad37effc5093ee4bda404c438f9c4b125c270a044180b96dab85dc705d49b3d1a04c2748e8032ef21f623d007524a2f942864115f3aee46fb940ec41cf1e5063637475cc57e91b569f1751541e38cca6268ab71c2f98486efd7c667038b15854ae5235286f99a7314ddeb8d3228e9f0fcc4cf8ee162a1bb38e41cf0b01cc57ffb21c53204bae50b966d7da44d7c80820d545aa32b2bf713de7459b9360a56de42eb6d7021a50d1bf6cb5d1935ab86cd22d02e7939740c3ece98a46c10ad798c3e4895875440feebdfc089af2b738cc203efedef77ef94dd543ae6de0aa20b4bfd67b6c3029f172c4450841eec5182ae52a58dd1865b9362ee62a2538414f54babda7d99b96e416bed40827b51714d25ffcba856f18476eba6f85178083b95d2f2a3af0f475ffb0b46c712e0e11f1c968491179f20d8cccb9608a398a11e7dc3060277823dee012842ded4eca04bcb008f22f0c9fd7d2893cbc6781bf3a5b4c339ede3a3f8ccb333ed7f58b1bc22ac7c5eccd8a11108bdef534a0e9b9f00ffd0425b68c4621c75303c068cd095644abab5a3239d528a56847a85a5464a092af69777615f396b517f341d11ff41f8dbddc7d7b47f1dfefc34aa84c6bc6f52b644700e3d671f6205e57e628e1adeabb680432f787ac34ab234b4224c1cfb7e017440dea1c38eb06503da3dabeb59acad8a82ba0851d1b7f5604eb6a7ad3ec0eb2877297f707f83ee80bbf77c97e49e78b0c5cda360f182fccb5cd09e3574fcc1d4be65c36f1b0f17595819859f62300a1671374795344c67a62b088881f94686b0075f1bffc2d21d3968d8d08037f1740287b69d282eef1649d08c83d297a0ce95e40e12c5d32c51d637d08ab105b856ea85aa8e37bc04538dfc3b465e96476fb6711131572153f7efd5772a15ede92093f8a67cc80f505360d44acaa9d27a7a70f1fd0ff91bf43fb085ef9ae729d6c38d6f32f92458cde231570a84257a578e26b2fb3a4b68a86201129601f8d54943b3193f8d2ec9c12d3ec99b534e37942bb1a208617d35b856489221c689997bf00ed89b71ccef85c4438833e6d1f5b08ae075e02a29f6eec3ec2babdfdd48c58e0e08a592b8e48bb2bd1950639d456e1ab7096b4507a1f06edc8be68fb9b901bec5b4ac554b5ebfdc6b944ee790416d7c077e27fa5a244b68bbf6af1774d37bf4d9559530a25b56350bac0b3c54a52d4d1fdd05505686704b039a5307d553d4c6be518c65144a4a1808de995892fc9b9b498e34b9d587a70faa550f1c377da2edf45798a0623ffe1f8de8790fcb246bbc36a67038bab61088964fa9276ae59d8af9a3e2c6fd6634880b76fdfb8e8cee9a0d7b52d6e1f10bf1cfb0afbc305816d3dce39bac4b542687b55b2121a109d529861e8203ff3b4f016935467be8a2825ed154c595b3f78c4cc0de37781082b472878649fabb2841050860aa2328cad18e42b83a6f4828f3237e70f2583f300f1a0e0c360cb22aea61311f977b3238fbee5de671d61842542512fec7f38b27ba760f94666fe40bb3c3b6a9402a314ceef80ec18689cc0219bbb7629e5c5645bea46c02d505a02639e6f10328a310f32dee02ed807641d9833ba7e428887cc215a9752424fb801351a360126428bac2f6b20c70c5d9ee11ff5d3aa2dd81158df462f543638863445d278856c90937cca86e33fd33985799dc5a5922c38bbf1bb4236f07c6a8aa29b81acfec01bf0146d3d92fb7f98a92e64499ee0af70e4287b7dd44fe24e2cd9f4c066d2c85371f9a3a69223c8b5a134f8eafd5a40fe04e531d0340de54beb1a8374cd2b0792ea1e75641d1ca7f6e43791a725c02e4dfad8048f8414df285c7f09b04361472eb3d8873b2233d9954d68348293acc62e5b2d654ad806657ef1bd098acc744c5519d0727b95eab16335f69d0074bea80121ff1c7df6dfefbb080aad605d753327b952bd3ccad11958dea3be8f7004166b5e87f0de4e77e32882842485fc78e63e2417e80eb6e2189604a3fefcd47aef9f46a184f0e20346b2ffe397aab53e9ca52548172cdb88a7415e3c98968d383831dbe6509c84b494d9a2ed7e4eff4ac2a98df93d27284eb7ceaf2e431c0f95934a4abacd21d576471cf0249f5feeefd272e8be565ac24ddae8722cbbec9fee63c406b8b46611f9265360023c824ff8ecb7ad5ebee16b733a55224f62042c3d0bbf7ab908163bd24a1515f4f7aea230bcf1527b45425dbdcea3dd9fe88405f573623e512a209c0b54188901584b16e81485b9835253602560c0bd6a82d698b0eccd5e44179bf4f9895d15b906ee867f61db8ece1701a97985e33d973ce5476c9bb71ab9435d1c8e32e57a8d4ad1a0697cc98eed45d6bcb59445aca8c676b4e8f81ef19fbf4808fd4816d7c0df3a66687d93b3159105dcfb6be372217f5320de23610981325eed09d80243c2db07a6bfc26a400dc431ca5cbcf9f63a2038cc42d34a76af54d5796a9e6fcfe549791d36d71ef77a25eee9e2d3e6fe0f19720a1cc7e3cac70585aff986601db7fe33720b7ff741d03e98a6e433acccfdc8e1147b30a8a869a1f4d2e7dec4f7bed10f02ed58fbd4e7f69b12bb6af3447a3d968e52a1a019cef81a913f0cfb7dd1604e57ce49e55ce1f8bd4464c0f54c81ec55a556e6196beb54876046714bdb41de4f019f42d7ecd4a935b79bf06d95a7602caeb4cc5bb3935d9b1588a1e262464780468f9b4f8fa2f56690f6247f4eaf10dd7e6798d7f7f4381ddd22338602b63392eb013d11ee631b5433ba607d0d74c054f80f699f92cf9287e4cbb673ee2082dcc95406dcb4c6bdfd2f0661b6a501514b0bbd2a21f131eb13a8ad843e7d1bbf1cb1b381f7615fbd0ab79101a212cee11df40dd51ec07c6a08f23094d3ca96baceb0a6c1ed2be1f4e00d573ae49db54e8b6cab3d5ade916cc24d3abdd59a4b4cc72cd725bda1e590c94389b58df33bdae0a49537a2b6a209cc1159d85b17e3da2c8560c4895f7028bb676b287f2738beff3dbb92509d104809b76bb720f788033b4d920d947729ccbffa9a9c939a3e450b8c0d5fbc91f5eae40801b106618c55035c6aa61ed6f9d5bb59e42b7f814acb4d76baf2daa1bac29171e50fad80a6fa26c593ed515b494798433de2f1f0848ccb42d8ce9b5606ff0f4ebc177637136247d359eaf86eaad03b0169aff40b2b05c949650b2096f723da8b61ecdc44efd3f2b58887b90f3708a8c83df231e644917405aad2729721a8c60700a8d863f208488571a08933518147035d1307f549e9dbadd408ca6e5e40e1e9e6597da679bcf44a2f157d67a2c2371f0933b40fba83180aff219c6df5bb0a34e1f885723cb5f7167cb42f1cdb91f3aee53fd66b3056e4484d438f5164f5d8b4eecc4537266c310bbcb3d321dba9eeeeea17841ebf6a18b67e3bb6fd181d9fa7d85f94516b4d47f8e40833a48890fca073f5f6819f23e455fe0bbfeccf1367fa65e0a950e299231bc09f4ebc9a7707f531da5b2e6cfca07dacac583cb0d1a8dfb488be33cfd48e6a85afba70003cb6ab3e29ad1d984011fb9fb59e8bcc46e6c4a34b123b53ac4b58e5b49bc38b5db4d0afe03a8b54cd525a4d607eae4755e5cafcc3f5e819d77c7543bbc1d6b375db80677eb54c23460157ef103359c6d96513bad102277725b32fb3b0bc902c5c6fe84b9dfe7ff8c4c8b1755007af53b56be5a447b1cfcfd735cc8bf783fb2a00739c36840b53545aa904ec9a74ab87e4832343b9096d25ff078b093b6f714645032feed26afa85b2d8dc481691658e9ef629acc0b2cf6b8796efdc3cdc9c8ee261285c6653cf2b4cf2dd3087bed6ae54a25678ce0cda5bcba9451a876a2f158a7bd222e408e10fe2d6deae103c5f05a32e72ad52d2e432a74a338b412381096fcb437b4723fd78db609bca4140af5ae544b85d448b3a739b9d7ba1be8b9860879fcbf023cd5c07a122054ac05656861dcf99df5d61e1867b92e5479ebcc8f5e09822adeeb47a74e5195444df12c7d5c3c39798deb5c9af6b195b42e77edd2901dbcfc2aedc2d2d416f183bd447b4b306e7d1d527e1ee53ea7a50392e5f3eb7fb7ea8d8d52ef56144dddf9efd8ea4a3f10873440ee8fd5c9cdf1aa575cdc62dcee7e1374aae525601addb94d3aaceb1282ee9886c79e3b679fd07f2c67e3428c5be005d60cf6d538492951178a9d25798164221e1d88f8423636e9260a39a67a10288954e3a3d304014f789aad8ce25ed3f699f681c2e4d40ed939182321808f392198a3271924f4a5ec86e413f3b9fa816a4a30f998e4bc0d345a4fde6c9405785b7ad53c52b5d57f19b8761ab5babc88105ab9973aff62abde2a5997df0cd8d1200733b8bcddd27f93f91a0da6c999ec04cab6c21844e034f9e04fe4f12038b6e02c145fb4d09c066b910e0724a2310c67f1bd4ea30d9789955ccd797d31267d797b110b336bca545c7b0b7dda7939dc67a6bcdbd47ccddba209b5fd3411a7f716ff1fa5b0c435df4ce2bd9ce93a092e1a1b23a7126780930608c5164d62a21107a8687eb71a87e2b7258f976d2e993aa62470e309f4489501d8d9573d4d2ca344cc72c352dea2d284f08060b2a7eeac545419fbc5f3c37cb1d32f91b1e14291d2d3c0a62a1e1261c36aa23e7c0b7ff1d3ed93c02dc19e53a3a044bddcd1d00d0730af6dec5da3d9e04cc63d4941de3adfd86b92d21f7069d0c22f190c0e6279ba4eab37a8391cd096bf3e1f88293fcffc0534520be75285a8480b421e3db65e13b94ce69995faf9f1ae045aeaaf74844cb474d7f6ee9a63c08779c78d3d2c3dbb6a2e831f1d1fc7ee416222d1df0e100b7f513f239b24e8a8c666c7fd2882bbf73682047322de632fe00ad27a804de16094ea7c30a775db836b6aab6f8957b61a4508f689f67e8216c34d30517dd12f2e6a168763f5b22ce64a1b8382dcd683b8237760491e42268ee1b1b3917c5da3e785baf2991cac948cdc5d6cd39f966ccfd90f0f21360e91360f1ddc7cd464312a599b5ee191ade2e0ffd2857108575ff7a9fa9a95660ac7b4cb2ad1d35653443f255e38663e83dac306470fd3b36206b434cc0f75e610bfe26b6fbc0b6ae25913a0c06e2c8c37f609bee25f90176251689f3c4d76f08d3f0c9c6bff0c18cf209844b2d5cb45a33f44317c60eef017d00f21e0d78ddc6db41c36923f7249b53c8874f1698281c8edf237e9313fbaa03e274f380e0d060ab8e1c2c40d8197148786adf8aa496367d8536fd50c02a3473e0d84f49f5cccbde17c81728f5da095bfb7c793abf4217013eee43cca7187fb5aaa3f6559f32e4a1ea7f1c7e5fcccb93e3a750f5bed16f9e43044eef5d5496364a3072b7bb6defbe9874a6946a6dcbdb077e3702166a1c914a9fb155b4f2ee57bd992d852796974651860973fa41a330d74788d049eedfb0c908e12681ef0099810b1e8a117091118db537709b7c26fb66ace30820", 0x1000}, {&(0x7f00000015c0)="28301fd11ad4dfcb52ce446fa7c4efe0b60bbed6e6b0009364efc5f6a0f155430ef414a48d0ec15d65147b2af2", 0x2d}, {&(0x7f0000001600)="37c1a7ec5b2bd2af7a86ab4c2e70e464e764b5fae4de4c36f8b23aca992af525fad3057615a6f7a9c435ba133f56f8bb300ed04e24b47e53830c3949240345d597667cabfab873793e2725ceb8df7307e68f6490fbc79de4129d65ab2b913e96e6541171e997fa806c9fb6e98e51816f2d50ec9c51e7f88a074cc79728ebb7a29c43b175986232ad4098d735c232cba8f54e1e5d8d00e92d7f580e9fa17e533efe7f73b76d9105e03e5f02a3c483b966abf33e41a1c8a9deb20fbd8d622d10489fe5241b3e46ca3e12dcba481cdb39dadf538b04a995e2f3f9f69cd51b811ea98e1a0de79f6117f271ec833288c2a21defb33415e66b2600", 0xf8}], 0x7}, 0x0)

[  244.319598] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:20 executing program 2:
perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x482e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil)
shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x1000004001)
shmctl$IPC_RMID(r0, 0x0)
shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/247)
syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00')
preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)

[  244.369722] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:20 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280), 0x0, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:20 executing program 2:
r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x2)
ioctl$SCSI_IOCTL_GET_PCI(r0, 0x6, 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x2)

05:47:20 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000140)={0x9c0000, 0x0, 0x3, <r2=>0xffffffffffffffff, 0x0, &(0x7f0000000100)={0xa20934, 0xfff, [], @p_u8=&(0x7f0000000040)=0x3}})
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000180)=""/140)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0)
write$selinux_load(r3, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305)
mmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x5, 0x20010, r3, 0x0)
r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000240), &(0x7f0000000300)=0x4)
ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60)
ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, 0x0)
dup2(0xffffffffffffffff, r4)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@local})
prctl$PR_GET_KEEPCAPS(0x7)

[  244.594845] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:20 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280), 0x0, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  244.659367] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  244.702464] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
[  244.746066] SELinux: failed to load policy
[  244.771655] audit: type=1400 audit(1583387240.914:78): avc:  denied  { map } for  pid=9229 comm="syz-executor.5" path="/selinux/load" dev="selinuxfs" ino=3 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1
05:47:21 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="68cdcc6419cf4f9c00730b9246c393b2ea40002c82bf2a909350e71ddbf4d4ff9d921da49f869212bbf23239568564d5f78ece16ebf26738b3f2b2a5916382f88be0f0c0694c6628b5aaa34639a34cfeb0285420cee15ee713d70dd1936e71f86b825d8ebf6a5f92a49b1477f80552099092bf6696a621a46d62e53468f9a0e67799f78469eda50950e84b41d3365d2a38b464656afec3cb9efaf3be87f38d56105c22cd6446498ec7b99ba1865e7819fda175dec6e1d98b038ea8e525652fb5c1ef02374270bd86c1f363a861967e823ed92e4890ab72867b5aae3b90ac661bf6609a55373b", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c00010062796e64000000000c0002000800010400000000"], 0x3}}, 0x8001)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffe1e, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000b00010067726574617000001400020008000100", @ANYRES32, @ANYBLOB="08000700ffffffff08000a00", @ANYRES32=r3, @ANYBLOB="6ec8192b707bddfe6d3c2bfb6a8cfe701bc64c4debadf7805e0fa24564b3a23cce9a2e17d7ee4b8357b93171f5b5656f2b03d99a4ce3c68d3832de5601bb8a2d2ef0c818becdb89aacfcc252f6f2b925b4e5c336799cf97694662d98752b54a03bceca24756fffd35ba0d035a835bf21a764f02f8e805d2a499223915d9d3663f001d92512c5769c51777d9c9d0b4b116f0b8f74febafd4e19781c21e142f2e23d225b2dbde2d191c6fba843eb0765ba6d24237317cbabdd2a10aa71559aae09e775a0f7c25893f35a7e43ff673cf8e1733b0ac5f6b52bed00862f76c1d285"], 0x4c}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0)
write$binfmt_aout(r5, &(0x7f0000000680)=ANY=[@ANYBLOB="000637620003555e5689d91b59672a8a298a7dd8a16795e08348c14dadc3cab5ed450fe2f2ea32a8944ae6a23e220ad9d351dfe3e71bf8c7784a744eaf295764d3c9f9"], 0x43)
sendfile(r5, r5, &(0x7f00000001c0), 0x8080fffffffe)
sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xa8a4d70f7ff29dd2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800)
r6 = socket$packet(0x11, 0x3, 0x300)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200))
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
r9 = fcntl$dupfd(r8, 0x0, r8)
ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200)
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r9, 0x84, 0x8, &(0x7f0000000480)=0x7, 0x4)
setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000140)=0xeb03, 0x4)
r10 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x106)
write$binfmt_aout(r10, &(0x7f0000000680)=ANY=[@ANYBLOB="000637620003555e5689d91b59672a8a298a7dd8a16795e08348c14dadc3cab5ed450fe2f2ea32a8944ae6a23e220ad9d351dfe3e71bf8c7784a744eaf295764d3c9f9"], 0x43)
sendfile(r10, r10, &(0x7f00000001c0), 0x8080fffffffe)
r11 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r12=>0x0}, 0x0)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r11, 0x84, 0x7c, &(0x7f00000000c0)={r12, 0x4}, 0x8)
getsockopt$inet_sctp_SCTP_RTOINFO(r10, 0x84, 0x0, &(0x7f0000000400)={r12, 0x40, 0x6a, 0x2}, &(0x7f0000000440)=0x10)
sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r7, @ANYBLOB], 0x20}}, 0x0)

[  244.827416] SELinux: failed to load policy
[  244.833950] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:21 executing program 4:
perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x2000000000000021, 0x2, 0x10000000000002)
connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x8, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24)
pipe2(0x0, 0x0)
openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nvme-fabrics\x00', 0x10000, 0x0)
socket(0x0, 0x0, 0x0)
sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1a9}}], 0x1, 0x0)
r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r2=>0xffffffffffffffff})
dup2(r2, r1)
ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r2, 0x40044103, &(0x7f0000000000)=0x5)

[  244.952591] batman_adv: Cannot find parent device
05:47:21 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cd", 0xc, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:21 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0)
r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0)
syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00')
sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[]}}, 0x24000004)
ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x1)
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0)
sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl(r3, 0x1000008912, &(0x7f0000000080)="08418330e91000105ab071")
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
sendto$inet(r0, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06)
getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000100)=0x80000000, &(0x7f0000000140)=0x4)
recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d)

[  245.100001] audit: type=1326 audit(1583387241.234:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9261 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0x0
05:47:21 executing program 3:
request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2)
r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00')
preadv(r1, &(0x7f00000017c0), 0x315, 0x800000)
symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00')
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff})
dup2(r3, r2)
setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "5cd72ec081da87d1", "49f16d0f91b44501f2da77752c43cf6f", "8b1b8dee", "c2f94cd46ed5f737"}, 0x28)
setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000080)=0x1, 0x4)
ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04)
r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00')
getdents(r4, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f)

[  245.194084] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:21 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cd", 0xc, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:21 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cd", 0xc, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  245.425035] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:21 executing program 5:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
r2 = dup(r1)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000))
r3 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r4=>0xffffffffffffffff})
dup2(r4, r3)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r5, 0x0, r5)
socket$nl_xfrm(0x10, 0x3, 0x6)
r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r7=>0xffffffffffffffff})
dup2(r7, r6)
r8 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r9=>0xffffffffffffffff})
dup2(r9, r8)
r10 = socket$unix(0x1, 0xeb795d895bd75740, 0x0)
r11 = dup(r10)
ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200)
ioctl$DRM_IOCTL_NEW_CTX(r9, 0x40086425, &(0x7f00000000c0))
mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000009c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid'}}], [], 0x6b}})

[  245.513771] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:21 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48", 0x12, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:21 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
accept(r4, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000740)='./file0\x00', 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0)
io_submit(0x0, 0x0, 0x0)
r5 = socket$inet(0x2, 0x803, 0xa0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
connect(r5, 0x0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200))
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r6 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0))
r7 = socket(0x400000000000010, 0x802, 0x0)
write(r7, 0x0, 0x0)
socket(0x400000000000010, 0x802, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
socket(0x400000000000010, 0x802, 0x0)
r8 = socket(0x10, 0x800000000080002, 0x10)
sendmmsg$alg(r8, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)
r9 = socket(0x10, 0x800000000080002, 0x10)
sendmmsg$alg(r9, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)
dup(r6)
r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
r11 = dup(r10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8b1a, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
r12 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r12, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10)
sendmmsg(r12, 0x0, 0x0, 0xf7c7ac320226deca)
r13 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r13, 0x0, 0x0)
sendmmsg(r13, &(0x7f0000001300), 0x266, 0xf7c7ac320226deca)
r14 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r14, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10)
setsockopt$sock_int(r14, 0x1, 0x12, &(0x7f0000000000)=0x1, 0x4)
sendto$inet(r14, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10)
sendto$inet(r14, &(0x7f0000000640)="d2441edc3ee909b0e5ac46fbd9d919c2f360abf3b90b07a798b3f924b8f51af5d655640135b3cb4163e048105bde3d33c6a10ed6bb9c3ec1e92e0eaf245cc9e64d8cc910200c3594883f40c5a011471e1439bd0515f22dbccb9cd8a1118ba4fc1b5ca487d117f85b75c5e4b5827629b1e89ebaf9a6cef023b3b29a99242814375341b1c0d6e273f4a2ae146672f80a66f3a9a3416b0fb60a004e75854c631fe4d6bdef132f1d0292d8cd1646ee048b0d14e7aa98b09ee7b34e552f59761db4198f0c364640fc1439226971b7f9f307162b4d59f9f628bee51b0b", 0xcd3bb81e40b21a5a, 0x401c005, 0x0, 0x0)
r15 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x6, 0x2d22c0)
pipe(&(0x7f0000000500)={<r16=>0xffffffffffffffff})
dup2(r16, r15)
getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0)
stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
setresgid(0x0, 0x0, 0x0)
r17 = getgid()
semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, r17, 0xee01, 0x0, 0x50, 0x2}, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4})
getgroups(0x1, &(0x7f0000000400)=[<r18=>r17])
setresgid(0x0, 0x0, r18)
socketpair$unix(0x1, 0x2, 0x0, 0x0)

[  245.675775] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:21 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48", 0x12, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:21 executing program 5:
r0 = socket$unix(0x1, 0x2, 0x0)
bind$unix(r0, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e)
r1 = socket$unix(0x1, 0x1, 0x0)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
write$selinux_context(r2, &(0x7f0000000040)='system_u:object_r:hald_sonypic_exec_t:s0\x00', 0x29)
connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0)
r3 = socket$unix(0x1, 0x2, 0x0)
connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
sendmmsg(r3, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0)
recvmmsg(r0, &(0x7f0000006480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)

[  245.790449] batman_adv: Cannot find parent device
[  245.983134] audit: type=1326 audit(1583387242.124:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9261 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0x0
[  246.135320] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:22 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48", 0x12, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:22 executing program 4:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @rand_addr=0x8}, 0x10)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa)

05:47:22 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
fdatasync(r0)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00')
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00')
sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x44, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x1c, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xef}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x100}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8801}, 0x40)
sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="00be64b2d3459633e0d101ac732c8bd229a765ea43c7d455cbfe4046dde56a654b581fba79741d6ccc64ebd429c6d150eedd586abdb98d371e13896b9ab357994737995133b03965472aa08ded6161f5f48a2a91afbafb3b9484fa66b37d8fda87f1f7d1693a5ba623e6e0823c2b92fbda808289effa0cdd79df53c5e1d5c08d7c119ef4f032fb9eefd90612c4d01040c84c0d64d3735bb66fcf8328c2caba38aa563c753cf0da0ad4ab90f5c88537cc1d8ea03abd88970d2a61e5f22eae897c07e16b0dfd069ac80056806724c7949422efb6d309f56127ba16b40c29b76bfd7affb5"], 0x3}}, 0x20000080)
r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0)
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0)
sendfile(r3, r4, 0x0, 0x4000000000010046)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
r8 = dup(r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
accept4$rose(r8, 0x0, &(0x7f00000003c0), 0x100000)
dup2(r6, r6)
r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00')
sendmsg$NL80211_CMD_GET_REG(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r9, 0x101}, 0x14}}, 0x0)

[  246.357945] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:22 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
fdatasync(r0)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00')
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00')
sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x44, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x1c, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xef}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x100}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8801}, 0x40)
sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="00be64b2d3459633e0d101ac732c8bd229a765ea43c7d455cbfe4046dde56a654b581fba79741d6ccc64ebd429c6d150eedd586abdb98d371e13896b9ab357994737995133b03965472aa08ded6161f5f48a2a91afbafb3b9484fa66b37d8fda87f1f7d1693a5ba623e6e0823c2b92fbda808289effa0cdd79df53c5e1d5c08d7c119ef4f032fb9eefd90612c4d01040c84c0d64d3735bb66fcf8328c2caba38aa563c753cf0da0ad4ab90f5c88537cc1d8ea03abd88970d2a61e5f22eae897c07e16b0dfd069ac80056806724c7949422efb6d309f56127ba16b40c29b76bfd7affb5"], 0x3}}, 0x20000080)
r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0)
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0)
sendfile(r3, r4, 0x0, 0x4000000000010046)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
r8 = dup(r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
accept4$rose(r8, 0x0, &(0x7f00000003c0), 0x100000)
dup2(r6, r6)
r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00')
sendmsg$NL80211_CMD_GET_REG(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r9, 0x101}, 0x14}}, 0x0)

05:47:22 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f", 0x15, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  246.566025] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:22 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
accept(r4, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000740)='./file0\x00', 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0)
io_submit(0x0, 0x0, 0x0)
r5 = socket$inet(0x2, 0x803, 0xa0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
connect(r5, 0x0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200))
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r6 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0))
r7 = socket(0x400000000000010, 0x802, 0x0)
write(r7, 0x0, 0x0)
socket(0x400000000000010, 0x802, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
socket(0x400000000000010, 0x802, 0x0)
r8 = socket(0x10, 0x800000000080002, 0x10)
sendmmsg$alg(r8, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)
r9 = socket(0x10, 0x800000000080002, 0x10)
sendmmsg$alg(r9, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)
dup(r6)
r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
r11 = dup(r10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8b1a, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
r12 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r12, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10)
sendmmsg(r12, 0x0, 0x0, 0xf7c7ac320226deca)
r13 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r13, 0x0, 0x0)
sendmmsg(r13, &(0x7f0000001300), 0x266, 0xf7c7ac320226deca)
r14 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r14, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10)
setsockopt$sock_int(r14, 0x1, 0x12, &(0x7f0000000000)=0x1, 0x4)
sendto$inet(r14, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10)
sendto$inet(r14, &(0x7f0000000640)="d2441edc3ee909b0e5ac46fbd9d919c2f360abf3b90b07a798b3f924b8f51af5d655640135b3cb4163e048105bde3d33c6a10ed6bb9c3ec1e92e0eaf245cc9e64d8cc910200c3594883f40c5a011471e1439bd0515f22dbccb9cd8a1118ba4fc1b5ca487d117f85b75c5e4b5827629b1e89ebaf9a6cef023b3b29a99242814375341b1c0d6e273f4a2ae146672f80a66f3a9a3416b0fb60a004e75854c631fe4d6bdef132f1d0292d8cd1646ee048b0d14e7aa98b09ee7b34e552f59761db4198f0c364640fc1439226971b7f9f307162b4d59f9f628bee51b0b", 0xcd3bb81e40b21a5a, 0x401c005, 0x0, 0x0)
r15 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x6, 0x2d22c0)
pipe(&(0x7f0000000500)={<r16=>0xffffffffffffffff})
dup2(r16, r15)
getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0)
stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
setresgid(0x0, 0x0, 0x0)
r17 = getgid()
semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, r17, 0xee01, 0x0, 0x50, 0x2}, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4})
getgroups(0x1, &(0x7f0000000400)=[<r18=>r17])
setresgid(0x0, 0x0, r18)
socketpair$unix(0x1, 0x2, 0x0, 0x0)

05:47:22 executing program 4:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f00000000c0)='/prkc/sys/nex/ipv4/vs/igno0&\x05\x1f\x98\x13\xc8w\x00\x00\x00\x00\xbf%\x8f\xab4\xdc\xca\x1a\xac\x81F\x9c\xaaY.#\xb5 ,\\`\xc2,\xe39}\xfb\x85R\xc6', 0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000078150000e0010000f000000000000000f0000000e0010000a8140000a8140000a8140000a8140000a81400000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000ccdc9ab4284c5f70c190c38040e9f3fffe880000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f6261746164760076657468305f766972745f77696669000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e4154000000000000000000000000000000000000000000000000000100000000e00000010000000000000000000000007f00000100000000000000000000000000000000fe88000000000000000000000000000100000000000000000000ffffe0000001000000000000000000000000000000000000000000000000000000000000000069705f767469300000000000000000006970366772653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002011681100000000000000000000000000000000000000000000000048006473740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000000002e2f6367726f75702f73797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f5ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000480052454449524543540000000000000000000000000000000000000000000000000000ac141400000000000000000000000000fe8800000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001801600100000000000000000000000000000000000000000000000048006862680000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028006d680000000000000000000000000000000000000000000000000000000009e800000000000048004d41535155455241444500000000000000000000000000000000000000000000000000000000000000000000000000000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xc0000004, 0x0}, 0x0, 0x8, &(0x7f0000000040))
syz_open_procfs(0x0, &(0x7f0000000140)='auxv\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r5=>0xffffffffffffffff})
dup2(r5, r4)
ioctl$SIOCGSTAMPNS(r5, 0x8907, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f0000000180)='task\x00')

05:47:22 executing program 2:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
fdatasync(r0)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00')
r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00')
sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x44, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x1c, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xef}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x100}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8801}, 0x40)
sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="00be64b2d3459633e0d101ac732c8bd229a765ea43c7d455cbfe4046dde56a654b581fba79741d6ccc64ebd429c6d150eedd586abdb98d371e13896b9ab357994737995133b03965472aa08ded6161f5f48a2a91afbafb3b9484fa66b37d8fda87f1f7d1693a5ba623e6e0823c2b92fbda808289effa0cdd79df53c5e1d5c08d7c119ef4f032fb9eefd90612c4d01040c84c0d64d3735bb66fcf8328c2caba38aa563c753cf0da0ad4ab90f5c88537cc1d8ea03abd88970d2a61e5f22eae897c07e16b0dfd069ac80056806724c7949422efb6d309f56127ba16b40c29b76bfd7affb5"], 0x3}}, 0x20000080)
r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0)
r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0)
sendfile(r3, r4, 0x0, 0x4000000000010046)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
r8 = dup(r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
accept4$rose(r8, 0x0, &(0x7f00000003c0), 0x100000)
dup2(r6, r6)
r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00')
sendmsg$NL80211_CMD_GET_REG(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r9, 0x101}, 0x14}}, 0x0)

05:47:22 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f", 0x15, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:22 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
accept(r4, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000740)='./file0\x00', 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0)
io_submit(0x0, 0x0, 0x0)
r5 = socket$inet(0x2, 0x803, 0xa0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
connect(r5, 0x0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200))
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r6 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0))
r7 = socket(0x400000000000010, 0x802, 0x0)
write(r7, 0x0, 0x0)
socket(0x400000000000010, 0x802, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
socket(0x400000000000010, 0x802, 0x0)
r8 = socket(0x10, 0x800000000080002, 0x10)
sendmmsg$alg(r8, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)
r9 = socket(0x10, 0x800000000080002, 0x10)
sendmmsg$alg(r9, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)
dup(r6)
r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
r11 = dup(r10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8b1a, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
r12 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r12, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10)
sendmmsg(r12, 0x0, 0x0, 0xf7c7ac320226deca)
r13 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r13, 0x0, 0x0)
sendmmsg(r13, &(0x7f0000001300), 0x266, 0xf7c7ac320226deca)
r14 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r14, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10)
setsockopt$sock_int(r14, 0x1, 0x12, &(0x7f0000000000)=0x1, 0x4)
sendto$inet(r14, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10)
sendto$inet(r14, &(0x7f0000000640)="d2441edc3ee909b0e5ac46fbd9d919c2f360abf3b90b07a798b3f924b8f51af5d655640135b3cb4163e048105bde3d33c6a10ed6bb9c3ec1e92e0eaf245cc9e64d8cc910200c3594883f40c5a011471e1439bd0515f22dbccb9cd8a1118ba4fc1b5ca487d117f85b75c5e4b5827629b1e89ebaf9a6cef023b3b29a99242814375341b1c0d6e273f4a2ae146672f80a66f3a9a3416b0fb60a004e75854c631fe4d6bdef132f1d0292d8cd1646ee048b0d14e7aa98b09ee7b34e552f59761db4198f0c364640fc1439226971b7f9f307162b4d59f9f628bee51b0b", 0xcd3bb81e40b21a5a, 0x401c005, 0x0, 0x0)
r15 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x6, 0x2d22c0)
pipe(&(0x7f0000000500)={<r16=>0xffffffffffffffff})
dup2(r16, r15)
getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0)
stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
setresgid(0x0, 0x0, 0x0)
r17 = getgid()
semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, r17, 0xee01, 0x0, 0x50, 0x2}, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4})
getgroups(0x1, &(0x7f0000000400)=[<r18=>r17])
setresgid(0x0, 0x0, r18)
socketpair$unix(0x1, 0x2, 0x0, 0x0)

05:47:22 executing program 4:
socket$nl_netfilter(0x10, 0x3, 0xc)
prlimit64(0x0, 0xe, &(0x7f0000000200)={0x9, 0x4000000000008d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0)
write(r1, &(0x7f0000000000)="b6", 0xfffffe7e)
pipe(&(0x7f00000002c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80000, 0x0)
ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000280)=0x3ff)
fcntl$setpipe(r3, 0x407, 0x0)
openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x4000, 0x0)
r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0)
r6 = socket$inet6(0xa, 0x3, 0xff)
ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000000300)={r6, 0xffffffffffffffff, 0x2, 0x1a, &(0x7f0000000140)="fa1186171ff1a2157dd474c9ab293620761afd39b6b9e322285f", 0x4, 0x0, 0x80, 0x0, 0x2, 0x2, 0x1, 'syz0\x00'})
write(r3, &(0x7f0000000340), 0x41395527)
inotify_rm_watch(0xffffffffffffffff, 0x0)
ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
socket$inet6(0xa, 0x3, 0xff)
sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8)
openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x404001, 0x0)

05:47:23 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
accept(r4, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000740)='./file0\x00', 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0)
io_submit(0x0, 0x0, 0x0)
r5 = socket$inet(0x2, 0x803, 0xa0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
connect(r5, 0x0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200))
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r6 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f00000001c0))
r7 = socket(0x400000000000010, 0x802, 0x0)
write(r7, 0x0, 0x0)
socket(0x400000000000010, 0x802, 0x0)
write(0xffffffffffffffff, 0x0, 0x0)
socket(0x400000000000010, 0x802, 0x0)
r8 = socket(0x10, 0x800000000080002, 0x10)
sendmmsg$alg(r8, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)
r9 = socket(0x10, 0x800000000080002, 0x10)
sendmmsg$alg(r9, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0)
dup(r6)
r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
r11 = dup(r10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8b1a, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
r12 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r12, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10)
sendmmsg(r12, 0x0, 0x0, 0xf7c7ac320226deca)
r13 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r13, 0x0, 0x0)
sendmmsg(r13, &(0x7f0000001300), 0x266, 0xf7c7ac320226deca)
r14 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r14, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10)
setsockopt$sock_int(r14, 0x1, 0x12, &(0x7f0000000000)=0x1, 0x4)
sendto$inet(r14, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10)
sendto$inet(r14, &(0x7f0000000640)="d2441edc3ee909b0e5ac46fbd9d919c2f360abf3b90b07a798b3f924b8f51af5d655640135b3cb4163e048105bde3d33c6a10ed6bb9c3ec1e92e0eaf245cc9e64d8cc910200c3594883f40c5a011471e1439bd0515f22dbccb9cd8a1118ba4fc1b5ca487d117f85b75c5e4b5827629b1e89ebaf9a6cef023b3b29a99242814375341b1c0d6e273f4a2ae146672f80a66f3a9a3416b0fb60a004e75854c631fe4d6bdef132f1d0292d8cd1646ee048b0d14e7aa98b09ee7b34e552f59761db4198f0c364640fc1439226971b7f9f307162b4d59f9f628bee51b0b", 0xcd3bb81e40b21a5a, 0x401c005, 0x0, 0x0)
r15 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x6, 0x2d22c0)
pipe(&(0x7f0000000500)={<r16=>0xffffffffffffffff})
dup2(r16, r15)
getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0)
stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
setresgid(0x0, 0x0, 0x0)
r17 = getgid()
semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, r17, 0xee01, 0x0, 0x50, 0x2}, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4})
getgroups(0x1, &(0x7f0000000400)=[<r18=>r17])
setresgid(0x0, 0x0, r18)
socketpair$unix(0x1, 0x2, 0x0, 0x0)

[  247.027960] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:23 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f", 0x15, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:23 executing program 2:
timer_create(0x2, 0x0, &(0x7f0000044000))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0xa, 0x4}, 0xc)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000000c0)={'batadv0\x00', <r6=>0x0})
r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00')
sendmsg$BATADV_CMD_TP_METER(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r7, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0)
r8 = dup(r0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x8480, 0x0)
sendmsg$BATADV_CMD_GET_GATEWAYS(r8, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x8004)
sendmsg$BATADV_CMD_GET_VLAN(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="6380d403", @ANYRES16=r7, @ANYBLOB="040025bd7000fbdbdf251100000005003800010000000500370000000000"], 0x24}, 0x1, 0x0, 0x0, 0x8100}, 0x4001)
clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)

[  247.283132] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:23 executing program 3:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f", 0x15, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:23 executing program 2:
timer_create(0x2, 0x0, &(0x7f0000044000))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0xa, 0x4}, 0xc)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
r5 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000000c0)={'batadv0\x00', <r6=>0x0})
r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00')
sendmsg$BATADV_CMD_TP_METER(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r7, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0)
r8 = dup(r0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x8480, 0x0)
sendmsg$BATADV_CMD_GET_GATEWAYS(r8, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x8004)
sendmsg$BATADV_CMD_GET_VLAN(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="6380d403", @ANYRES16=r7, @ANYBLOB="040025bd7000fbdbdf251100000005003800010000000500370000000000"], 0x24}, 0x1, 0x0, 0x0, 0x8100}, 0x4001)
clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)

05:47:23 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c", 0x16, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  247.656551] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:24 executing program 2:
r0 = fanotify_init(0x1, 0x1)
r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0xf82130a3fcb7ef43, 0x20)
fanotify_mark(r0, 0x1, 0x8000000, r1, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00')
r3 = open(&(0x7f0000002000)='./bus\x00', 0x34d580, 0x0)
r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r5=>0xffffffffffffffff})
dup2(r5, r4)
ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000040))
sendfile(r3, r2, 0x0, 0x401)
connect$netlink(r3, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x8000}, 0xc)
recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000140)=""/204, 0xcc, 0x1, &(0x7f0000000240)={{0x3, @default, 0x7}, [@null, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null]}, 0x48)

[  247.847217] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:24 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800004000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x818, 0x0)
r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00')
ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100))
fchdir(r0)
open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0)
r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0)
mkdirat(r2, &(0x7f00000001c0)='./file1\x00', 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
mkdirat(r2, &(0x7f00000003c0)='./file0\x00', 0x0)
renameat(r2, &(0x7f0000000200)='./file1\x00', r2, &(0x7f00000000c0)='./file0/file0\x00')

05:47:24 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x100, 0x5, 0x1}, 0x0)
socket$key(0xf, 0x3, 0x2)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20, 0x0)
pipe(&(0x7f0000000940)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
vmsplice(r1, &(0x7f0000000000), 0x0, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9)
r4 = syz_open_procfs(0x0, 0x0)
sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0x1, 0x0, 0x0}, 0x10)
r5 = creat(&(0x7f0000000040)='./bus\x00', 0xa)
munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000)
fcntl$setstatus(r5, 0x4, 0x46000)
lseek(r5, 0x4200, 0x0)
r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r7=>0x0)
dup(0xffffffffffffffff)
open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0)
io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}])
r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
sendfile(r5, r8, 0x0, 0x8400fffffffb)
sendfile(r3, r3, &(0x7f0000000100), 0x8080fffffffe)

05:47:24 executing program 4:
prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
socketpair(0x8000000000001e, 0x5, 0x0, 0x0)
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
socket(0x10, 0x803, 0x0)
r4 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x29, 0x4)
setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3)
sendto$inet(r4, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x9, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0xe78}]}}]}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="31698ca308e4caded60f4e87548043a1f5f8466a248812ef1166265f6dfd0e8c5b7fdf822c02ee2438380d4cc484b7585dad8991b37ef31b8099bbaf97458e28935fcb540677dd18e6"], 0x1}, 0x1, 0x0, 0x0, 0x8890}, 0x801c011)
r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvme-fabrics\x00', 0x800, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f00000000c0), 0x4)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r6 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127baae09a26c08d0153bd5a49d6748f6c07d75cc2e7eb4367b92abf90b9a39bf8fabddb4b79515fc7194d4df5a0118ca46b1513277f9814b7e341f616a3636d3955333aa7ad584", 0xd3, 0x0)
add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, 0x0, r6}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}})
ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, 0x0)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$alg(0x26, 0x5, 0x0)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r7, 0x0, r7)
r8 = accept4(r7, 0x0, 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/protocols\x00')
sendfile(r8, 0xffffffffffffffff, 0x0, 0x84c)
syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00')
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x8)

05:47:24 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x149442, 0x0)
setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000100)=0x40, 0x4)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000300)={0x0, 0xffffffffffffffd2, 0x0}, 0x8055)
r1 = getpid()
sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
prlimit64(r1, 0xe, &(0x7f0000000240)={0x9, 0x6}, 0x0)
r2 = getpid()
sched_setattr(r2, &(0x7f0000000040)={0xfffffffffffffd42, 0x2, 0x10, 0x0, 0x9}, 0x0)
r3 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r4=>0xffffffffffffffff})
dup2(r4, r3)
ioctl$TIOCGPTPEER(r4, 0x5441, 0x2)
r5 = socket$inet6(0xa, 0x3, 0x81)
recvmmsg(r5, &(0x7f0000000140), 0x0, 0x0, 0x0)
pipe(&(0x7f00000003c0)={<r6=>0xffffffffffffffff, <r7=>0xffffffffffffffff})
fcntl$setpipe(r7, 0x407, 0x0)
r8 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r9=>0xffffffffffffffff})
dup2(r9, r8)
ioctl$ASHMEM_GET_NAME(r9, 0x81007702, &(0x7f0000000340)=""/107)
r10 = pkey_alloc(0x0, 0x1)
pkey_free(r10)
pkey_free(r10)
write(r7, &(0x7f0000000340), 0x41395527)
vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000000, 0x40000000011, r11, 0x0)
syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter6\x00')
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r12 = socket$nl_xfrm(0x10, 0x3, 0x6)
fsetxattr(r12, &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000001c0)='threaded\x00', 0x9, 0x0)
r13 = creat(&(0x7f00000002c0)='./bus\x00', 0x180)
fcntl$setstatus(r13, 0x4, 0x6100)
write$cgroup_type(r13, &(0x7f0000000200)='threaded\x00', 0x175d900f)

05:47:24 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c", 0x16, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  248.077713] audit: type=1804 audit(1583387244.214:81): pid=9442 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir797178729/syzkaller.cwcNUl/76/bus" dev="sda1" ino=16667 res=1
05:47:24 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0)
r3 = socket$inet(0x2, 0x4000000805, 0x0)
r4 = socket$inet_sctp(0x2, 0x5, 0x84)
r5 = dup3(r3, r4, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10)
sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
sendmsg$RDMA_NLDEV_CMD_SYS_GET(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000)
sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, <r6=>0x0]}, &(0x7f0000a8a000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6c, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400)={r6}, 0x0)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r6, 0x1599beaf}, &(0x7f00000003c0)=0x8)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x9, 0x4, 0x8209, 0x6, 0x6, 0x0, 0x3f, 0xffffff80, <r7=>r6}, &(0x7f00000000c0)=0x20)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x17ad, 0x4, 0xe1, 0x5, r7}, 0x10)
r8 = socket(0x10, 0x803, 0x0)
getsockopt$SO_BINDTODEVICE(r8, 0x1, 0x22, &(0x7f0000000000), 0x20a154cc)

[  248.242633] audit: type=1400 audit(1583387244.304:82): avc:  denied  { map } for  pid=9436 comm="syz-executor.1" path="socket:[36323]" dev="sockfs" ino=36323 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1
05:47:24 executing program 5:
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000240)={0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, 0x0})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)='./file0\x00', 0x500, 0x150)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x1c})
ioctl$UI_DEV_CREATE(r2, 0x5501)
ioctl$UI_DEV_DESTROY(r2, 0x5502)
r3 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r4=>0xffffffffffffffff})
dup2(r4, r3)
r5 = accept4$ax25(r4, &(0x7f0000000400)={{0x3, @netrom}, [@bcast, @default, @netrom, @null, @bcast, @netrom, @default, @default]}, &(0x7f0000000480)=0x48, 0x800)
fcntl$dupfd(r2, 0x406, r5)
dup2(r1, r0)
ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000280)={0x10000, 0x22, 0x1, {0xa, @sliced={0x8, [0x7, 0x9, 0x9, 0x3, 0x9, 0x3, 0x3, 0x200, 0x6d1, 0xe8, 0x4, 0x1, 0x7, 0x0, 0x45, 0x8, 0x5, 0xad, 0x8, 0x40, 0xce00, 0x2, 0x94a, 0x3, 0x4, 0xfff, 0x3, 0xffff, 0x6, 0x20, 0x3, 0x20, 0x71, 0x80, 0x0, 0xfbff, 0x6, 0x3, 0x7, 0x1, 0x2, 0x1, 0x6, 0xad, 0x1, 0x7, 0x0, 0x8], 0xfffffffc}}, 0xbc43})
ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000180)=""/39)
r6 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0)
write$9p(r6, &(0x7f0000001400)="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", 0x600)
r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x100, 0x0)
r9 = socket$inet6_tcp(0xa, 0x1, 0x0)
r10 = fcntl$dupfd(r9, 0x0, r9)
ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200)
renameat2(r8, &(0x7f0000000200)='./file0\x00', r10, &(0x7f00000003c0)='./file0\x00', 0x0)
setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0x597, 0x2)
sendfile(r6, r7, 0x0, 0x10000)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4)

05:47:24 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x1c})
ioctl$UI_DEV_CREATE(r4, 0x5501)
ioctl$UI_DEV_DESTROY(r4, 0x5502)
write(r4, &(0x7f0000000340), 0xfffffffffffffe3d)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
accept(0xffffffffffffffff, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0])
r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9e, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r6}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0)
mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYPTR64], 0x8)
r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
fallocate(r8, 0x3, 0x3305, 0x1000000000000003)
writev(r8, &(0x7f0000000380)=[{0x0}], 0x1)
ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0))
r9 = creat(0x0, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(r9, 0x40286608, 0x0)
fallocate(r9, 0x0, 0x0, 0x1000100)
lseek(r9, 0x0, 0x3)
open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x11)
ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f0000000400))

[  248.314861] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:24 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c", 0x16, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  248.505735] input: syz1 as /devices/virtual/input/input5
[  248.536398] input: syz1 as /devices/virtual/input/input6
05:47:24 executing program 2:
sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000110000002c00038008000200000000000800020000000000080002000000000008000200000000000800010000000000100001800c0001006574683a776731002400038008000300000000000800010000000000080003002000000008000100000000003000058008000100756470001c0002800800020000000000080001000000000008000200000000000800010065746800"], 0xa4}}, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
select(0x40, &(0x7f0000000140)={0x0, 0xbc14, 0x3, 0x2, 0x0, 0x6, 0x7, 0x8}, &(0x7f0000000180)={0x1, 0x4, 0xffffffff, 0x200, 0x80000000, 0x8, 0x72b, 0xfaf}, &(0x7f00000001c0)={0x2, 0xe5, 0x8, 0x1f, 0x8, 0x1f, 0x90, 0x2}, &(0x7f0000000200)={0x0, 0x7530})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000340)={0xa10000, 0x1f, 0x6, <r4=>0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x98090f, 0x8001, [], @ptr=0x7}})
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00')
sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)={0x68, r5, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x6, @mcast1, 0x9}}}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x8004}, 0x4000000)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0)
write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x3d, 0x6, 0x0, {0x0, 0x0, 0x14, 0x0, 'net/ip_tables_names\x00'}}, 0x3d)
ioctl(r1, 0x4, &(0x7f0000000040)="f0e1b21fd4c1179ece20b7e843c6b5a20126f1")
lsetxattr$trusted_overlay_origin(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f0000000700)='y\x00', 0x2, 0x3)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x1)

[  248.627723] audit: type=1804 audit(1583387244.764:83): pid=9466 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir550904960/syzkaller.oFfPzf/96/file0" dev="sda1" ino=16668 res=1
[  248.694927] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:24 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0)
r0 = getpid()
sched_setattr(r0, 0x0, 0x0)
sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0)
gettid()
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
stat(0x0, &(0x7f0000000380))
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
bind$isdn_base(r5, &(0x7f0000000040)={0x22, 0x4, 0x1, 0x4, 0x7f}, 0x6)
socket$netlink(0x10, 0x3, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRES32, @ANYRES16, @ANYPTR, @ANYRESHEX, @ANYRESHEX, @ANYRESHEX=0x0, @ANYRES64], @ANYRESOCT, @ANYBLOB="48272ebe44c75bba", @ANYBLOB="cf00cf1de4a0e4657bebd6e8ba"])
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000340)='[\'e8\x93\x1atO1', 0xffffffffffffffff)
syz_mount_image$ext4(0x0, 0x0, 0x7, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0)

[  248.814806] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock
05:47:25 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:25 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
getcwd(&(0x7f0000000140)=""/9, 0x9)
dup2(r1, r0)
fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@v1={0x2, "571a7b3a67404e4a0ea5c8af"}, 0xd, 0x1)

05:47:25 executing program 4:
prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
socketpair(0x8000000000001e, 0x5, 0x0, 0x0)
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
socket(0x10, 0x803, 0x0)
r4 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x29, 0x4)
setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3)
sendto$inet(r4, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x9, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0xe78}]}}]}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="31698ca308e4caded60f4e87548043a1f5f8466a248812ef1166265f6dfd0e8c5b7fdf822c02ee2438380d4cc484b7585dad8991b37ef31b8099bbaf97458e28935fcb540677dd18e6"], 0x1}, 0x1, 0x0, 0x0, 0x8890}, 0x801c011)
r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvme-fabrics\x00', 0x800, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f00000000c0), 0x4)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r6 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127baae09a26c08d0153bd5a49d6748f6c07d75cc2e7eb4367b92abf90b9a39bf8fabddb4b79515fc7194d4df5a0118ca46b1513277f9814b7e341f616a3636d3955333aa7ad584", 0xd3, 0x0)
add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, 0x0, r6}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}})
ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, 0x0)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$alg(0x26, 0x5, 0x0)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r7, 0x0, r7)
r8 = accept4(r7, 0x0, 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/protocols\x00')
sendfile(r8, 0xffffffffffffffff, 0x0, 0x84c)
syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00')
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), 0x8)

05:47:25 executing program 5:
setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty}}, 0xe8)
syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
r3 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r4=>0xffffffffffffffff})
dup2(r4, r3)
ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x1})
mknodat(r2, &(0x7f0000000140)='./file0\x00', 0x0, 0x0)
fsync(r2)

[  248.961684] audit: type=1800 audit(1583387244.794:84): pid=9466 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16668 res=0
[  248.987076] EXT4-fs error (device loop2): ext4_ext_check_inode:510: inode #2: comm syz-executor.2: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0)
[  249.137321] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing
[  249.152594] isofs_fill_super: root inode is not a directory. Corrupted media?
[  249.160730] EXT4-fs (loop2): get root inode failed
[  249.212298] EXT4-fs (loop2): mount failed
05:47:25 executing program 4:
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @ipv4={[], [], @loopback}}, @IFLA_IPTUN_LINK={0x8, 0x1, r3}, @IFLA_IPTUN_6RD_PREFIXLEN={0x6, 0xd, 0x4336}]}}}]}, 0x54}}, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, r3, r0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x4}, {0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty, 0x0, 0x3, 0x0, 0x0, 0x1000}}, 0xe8)
syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0)
r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x30)
fchdir(r4)
creat(&(0x7f0000000300)='./file0\x00', 0x0)
getdents(r4, 0x0, 0x0)
r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r6=>0xffffffffffffffff})
dup2(r6, r5)
ioctl$SIOCRSSCAUSE(r6, 0x89e1, &(0x7f0000000100)=0x4ba)

05:47:25 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  249.425051] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing
05:47:25 executing program 5:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
dup3(r1, r0, 0x0)
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
dup2(r3, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fe)
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x80201)
write$vhci(r5, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r6 = socket$inet(0x2, 0x4000000805, 0x0)
r7 = socket$inet_sctp(0x2, 0x5, 0x84)
r8 = dup3(r6, r7, 0x0)
sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
sendmsg$RDMA_NLDEV_CMD_SYS_GET(r8, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x800)
sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$sock_timeval(r4, 0x1, 0x42, &(0x7f0000000080), &(0x7f0000000140)=0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, <r9=>0x0]}, &(0x7f0000a8a000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x6c, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400)={r9}, 0x0)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r9, 0x1599beaf}, &(0x7f00000003c0)=0x8)
setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r9, 0x8, 0x6}, 0xc)
close(r5)

05:47:25 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = dup(0xffffffffffffffff)
getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4)
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86900278dcff47d010000805acf4fe03652", 0x2f}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[  249.484905] audit: type=1400 audit(1583387245.624:85): avc:  denied  { associate } for  pid=9538 comm="syz-executor.4" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
05:47:25 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
getcwd(&(0x7f0000000140)=""/9, 0x9)
dup2(r1, r0)
fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@v1={0x2, "571a7b3a67404e4a0ea5c8af"}, 0xd, 0x1)

[  249.564658] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:25 executing program 2:
ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f00000000c0)={0x800, 0x200, 0x0, 0x3})
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0)
setsockopt$inet6_group_source_req(r3, 0x29, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00')
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0)
r4 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TIOCL_SETSEL(r4, 0x541c, 0x0)
ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x0, 0x0, 0x800}})
fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000100000000000000040000000002000010000000000000002000000000000000cc2271bf4158803889a65286b24cd92854a67c6adb89eafe9afcaf651c7f8e4cfe219dd8a4206f26ada18fb4bf8b7b23e076e2de463d6876b30a2ac4db9c50973c4d94aee0"], 0x1, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

[  249.650267] audit: type=1804 audit(1583387245.784:86): pid=9540 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir109746098/syzkaller.wfNh8h/90/file0/file0" dev="loop4" ino=2 res=1
05:47:25 executing program 4:
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @ipv4={[], [], @loopback}}, @IFLA_IPTUN_LINK={0x8, 0x1, r3}, @IFLA_IPTUN_6RD_PREFIXLEN={0x6, 0xd, 0x4336}]}}}]}, 0x54}}, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, r3, r0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x4}, {0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@empty, 0x0, 0x3, 0x0, 0x0, 0x1000}}, 0xe8)
syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0)
r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x30)
fchdir(r4)
creat(&(0x7f0000000300)='./file0\x00', 0x0)
getdents(r4, 0x0, 0x0)
r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r6=>0xffffffffffffffff})
dup2(r6, r5)
ioctl$SIOCRSSCAUSE(r6, 0x89e1, &(0x7f0000000100)=0x4ba)

05:47:26 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0)
r0 = getpid()
sched_setattr(r0, 0x0, 0x0)
sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0)
gettid()
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
stat(0x0, &(0x7f0000000380))
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
bind$isdn_base(r5, &(0x7f0000000040)={0x22, 0x4, 0x1, 0x4, 0x7f}, 0x6)
socket$netlink(0x10, 0x3, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRES32, @ANYRES16, @ANYPTR, @ANYRESHEX, @ANYRESHEX, @ANYRESHEX=0x0, @ANYRES64], @ANYRESOCT, @ANYBLOB="48272ebe44c75bba", @ANYBLOB="cf00cf1de4a0e4657bebd6e8ba"])
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000340)='[\'e8\x93\x1atO1', 0xffffffffffffffff)
syz_mount_image$ext4(0x0, 0x0, 0x7, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0)

05:47:26 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:26 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x4, 0x40040)
getsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000300)=""/191, &(0x7f00000003c0)=0xbf)
r1 = socket$inet(0x2, 0x4000000000000001, 0x20)
socketpair(0x11, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
getsockopt$inet_buf(r2, 0x0, 0x30, &(0x7f00000000c0)=""/227, &(0x7f0000000240)=0xe3)
setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000540)=0x2000000000000074, 0x56c)
bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r3, 0x0, r3)
ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000280)={'veth1_virt_wifi\x00', 0x4})
sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
write(r1, &(0x7f00000001c0)="ee0107200c9f8fbf5ca312794d57d7c84858f6d02ac7044478a1ceaba80c756a581354e1c3bc0f39ab71266531e5c6b4d607559441a2a1492bc86146e4a205b0b8db310441cf08c043a775bb5e3a82dbc589f50c52e15266c634790cab6745980751ca698dbd91bc", 0x7f37)

[  250.052040] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing
05:47:26 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x10001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x7fff}], 0x6c004, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r4, &(0x7f0000000180)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x140c, 0x4, 0x70bd25, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8815}, 0x80)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, <r5=>0x0})
sendmmsg(r5, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0)

05:47:26 executing program 4:
r0 = socket$kcm(0x29, 0x2, 0x0)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff)
close(r0)
r1 = socket$kcm(0xa, 0x5, 0x0)
sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @local, 0x7}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)="8c", 0x1}], 0x1}, 0x100c0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
setsockopt$sock_attach_bpf(r1, 0x1, 0xd, &(0x7f0000000100), 0x4)
close(r1)

[  250.169788] isofs_fill_super: root inode is not a directory. Corrupted media?
05:47:26 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:26 executing program 5:
r0 = socket(0xa, 0x2, 0x0)
r1 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0)
setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4)
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff})
dup2(r3, r2)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket$netlink(0x10, 0x3, 0x0)
r7 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, <r8=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="540000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000003400128008000100736974002800028014000b0000000000000000000000ffff7f000001080001006bff8f637ce507e875de02aa6883f06e81c0108d671dab4ff8df750ff8b015393353fdfe058970f0a47b7b9924ac53774d6aa0fd13ed3e0924054dbf866ec4b8de758ba397fda6684e4d166596045758fda90ee87c", @ANYRES32=r8, @ANYBLOB="06000d0036430000"], 0x54}}, 0x0)
r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f00000002c0)={<r10=>0xffffffffffffffff, <r11=>0xffffffffffffffff})
dup2(r10, r9)
r12 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x1, 0x2)
fstatfs(r12, &(0x7f0000000380)=""/31)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x78c, 0xeabd, 0xeba, 0x200, r5, 0x1, [], r8, r10, 0x5, 0x5, 0x4}, 0x40)
getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4)
ioctl$int_in(r11, 0x5452, &(0x7f0000000300)=0x3)
getsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0x4)
fallocate(r1, 0x0, 0xffff, 0x9)
sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20, @remote}, 0x10)
sendfile(r0, r1, 0x0, 0x10001)
recvmmsg(r0, &(0x7f000000a100)=[{{&(0x7f0000009f40)=@can, 0x80, 0x0}}], 0x1, 0x2001, 0x0)

[  250.606603] ISOFS: Unable to identify CD-ROM format.
[  250.619149] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'.
05:47:26 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r3, 0x220, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0xfffffffa}, @NLBL_MGMT_A_DOMAIN={0x1b, 0x1, 'trusted+-$tlo^bdevuser\x00'}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8080}, 0x40010)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:26 executing program 4:
r0 = socket$pppl2tp(0x18, 0x1, 0x1)
setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8)
r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe)
ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100))
add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc)
r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8)
r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000480), 0x0, r2)
keyctl$dh_compute(0x17, &(0x7f0000000580)={r3, r1, r1}, &(0x7f0000000740)=""/243, 0x336, &(0x7f0000000300)={&(0x7f0000000700)={'crc32c-generic\x00\x000\x16\xc7\xec\x91\x05\x0e\xbb\x7f\x11\x97\xa9\x1a\xb4\x00'}})
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)=@builtin='builtin_trusted\x00')
connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e)
ioctl$PPPIOCGCHAN(r0, 0x80047437, 0x0)

05:47:26 executing program 2:
ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f00000000c0)={0x800, 0x200, 0x0, 0x3})
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0)
setsockopt$inet6_group_source_req(r3, 0x29, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00')
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0)
r4 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TIOCL_SETSEL(r4, 0x541c, 0x0)
ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x0, 0x0, 0x800}})
fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000100000000000000040000000002000010000000000000002000000000000000cc2271bf4158803889a65286b24cd92854a67c6adb89eafe9afcaf651c7f8e4cfe219dd8a4206f26ada18fb4bf8b7b23e076e2de463d6876b30a2ac4db9c50973c4d94aee0"], 0x1, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

05:47:26 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:26 executing program 1:
ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f00000000c0)={0x800, 0x200, 0x0, 0x3})
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0)
setsockopt$inet6_group_source_req(r3, 0x29, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00')
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0)
r4 = syz_open_dev$tty20(0xc, 0x4, 0x1)
ioctl$TIOCL_SETSEL(r4, 0x541c, 0x0)
ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x0, 0x0, 0x800}})
fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000100000000000000040000000002000010000000000000002000000000000000cc2271bf4158803889a65286b24cd92854a67c6adb89eafe9afcaf651c7f8e4cfe219dd8a4206f26ada18fb4bf8b7b23e076e2de463d6876b30a2ac4db9c50973c4d94aee0"], 0x1, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

05:47:26 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000240)={0x40, 0xa, 0x4, 0xe000, 0x2, {}, {0x3, 0xc, 0x8, 0x2, 0x9, 0x9, "00aa5bd2"}, 0xa4bc, 0x1, @fd=<r8=>r7, 0x5})
dup(r8)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468000000001a0002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000f0edec125d0000000000030000000000000000b71c5a60d6b4c67ace8e71866d4a3692057500a2fa93bda895db6ac56ae0af7a9cd035c689b2425b85b1d6bcdc87931634ad7ffb0acb1e0ad7e76549a2be92218f1fd313ec32fff00cb050045be1e3c8d164822f9c14cd673475c35250d4441a61ea227544e7653953b7342a2cb3cdfaa2166000c1ca3c2845a5229114c5861f718be13cdb11607a29dcdbbaaff15f7c1688690a3950fddc8bd3f3a40c6c7d8bf4a05d66644e0886827c35ea370fdf687a4c555393a8942b2ad68dd34b0fa91cfa"], 0x48}}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xfffffffffffffc37, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000000140001040000000000000000021f0000", @ANYRES32=r9, @ANYBLOB="08000200a0000020"], 0x20}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x6841}}, 0x20}}, 0x0)

05:47:27 executing program 4:
openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0)
syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00')
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00')
fchdir(r1)
r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0)
readahead(0xffffffffffffffff, 0x555, 0x832)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c9, &(0x7f00000001c0)={@fixed={[], 0x10}, 0x3})
write(r2, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0)
r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r6=>0xffffffffffffffff})
dup2(r6, r5)
r7 = dup2(0xffffffffffffffff, r6)
ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r7, 0xc2604110, &(0x7f0000000280)={0x8, [[0x20, 0x3, 0x6, 0xff, 0xffffecf7, 0x8, 0x2, 0x200], [0x2, 0x0, 0x1000, 0x5, 0xc1, 0x5, 0x8, 0x80000001], [0x401, 0x5, 0x4, 0x1, 0x0, 0x5, 0x200, 0xa79e]], [], [{0x4, 0x7, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x7fffffff, 0x0, 0x1, 0x1}, {0x9f4, 0xabec, 0x0, 0x0, 0x0, 0x1}, {0x3, 0x800, 0x1, 0x1}, {0x3, 0x11ac, 0x0, 0x0, 0x0, 0x1}, {0x8000, 0x4, 0x0, 0x1, 0x1}, {0x6, 0xfffffff7, 0x1, 0x1}, {0x3, 0x300000, 0x0, 0x0, 0x0, 0x1}, {0xb65, 0x80000000, 0x1, 0x1, 0x1, 0x1}, {0x9, 0x1, 0x1, 0x1, 0x1}, {0xfffffffa, 0x4, 0x0, 0x0, 0x1}, {0x1, 0x1, 0x0, 0x1, 0x1}], [], 0x5})
r8 = inotify_init1(0x0)
inotify_add_watch(r8, &(0x7f0000000040)='./control\x00', 0xa4000960)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e21, 0x323, @mcast2, 0x2}, @in={0x2, 0x4e22, @rand_addr=0xffff5285}, @in6={0xa, 0x4e24, 0x7fff, @remote, 0x100}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e20, @rand_addr=0x1}], 0x78)
open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)

05:47:27 executing program 4:
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
close(r0)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={<r4=>0xffffffffffffffff})
r5 = dup(r4)
r6 = socket$inet6_tcp(0xa, 0x1, 0x0)
r7 = fcntl$dupfd(r6, 0x0, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
fcntl$F_GET_RW_HINT(r7, 0x40b, &(0x7f0000000040))
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400201)
syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x113, 0x0, 0x0, 0x0)

[  251.056533] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
[  251.056752] ISOFS: Unable to identify CD-ROM format.
[  251.086613] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready
[  251.096867] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
05:47:27 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:27 executing program 5:
r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400240, 0x0)
sendto$rose(r0, &(0x7f0000000040)="addc542cfbaf433327d2e7c2198575fe8471fef6db872b15d87c59103cdce0781eac32ab671e20d669090df3c212fdfea41b470e0ad436ba08c656c54c6c91524e0f36fccc5ab86f4558224afb82988cb319c54730edef44e93049fe9c297d72e4945f5231229acec1e65d0a1b9a8972379e1ddbdcbe", 0x76, 0x40000, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c)
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x1)
r2 = socket$nl_audit(0x10, 0x3, 0x9)
write$binfmt_elf32(r2, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0xec, 0x6, 0x6, 0x8, 0x2, 0x6, 0x3, 0x3e2, 0x38, 0x29f, 0x0, 0x4, 0x20, 0x1, 0xe2, 0x3, 0xfff}, [{0x70000000, 0x5, 0x80000000, 0xffffffff, 0x10001, 0x80000001, 0x2, 0x9}], "ee0209fe2dad2a2fa464d5397153836849a1ea782f61c35e3f6160a3c218e5c4bf4084f89deb895b83f4038c05013145f55213815b160e39d9e8d34d0ea8ec4833ffb1e40957e5e7248847af3f95a9ac3f07d9b8a1f6d9846093ddde5e356ae07f1c8a1251fe715bc0afc5ac7e67fdc3b83ca4c04f66e3a9cc92ea7b2651c4143cb49273", [[], [], []]}, 0x3dc)
ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000005c0)={0xfffffff, 0x535425ca, 0x7b27, <r3=>0xffffffffffffffff, 0x0, &(0x7f0000000580)={0x980373, 0x7ff, [], @p_u32=&(0x7f0000000540)=0x64}})
ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000640)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @broadcast}, 0x2, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000600)='rose0\x00', 0x7fff, 0x73, 0x8})
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000740)={0x0, 0x8, 0x2, <r4=>0xffffffffffffffff, 0x0, &(0x7f0000000700)={0x9909cd, 0xfff, [], @p_u32=&(0x7f00000006c0)=0x9}})
ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000780)={0xb, @vbi={0x5, 0x80000001, 0x9, 0x2036315a, [0xffffffbd, 0xfff00000], [0xff, 0x6], 0x108}})
ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000880)={0x1000, 0xc, 0x4, 0x4000, 0x6, {0x77359400}, {0x5, 0x0, 0x7, 0x1f, 0xff, 0x1f, '/o\'\"'}, 0x9, 0x1, @offset=0x8df, 0x5, 0x0, <r5=>0xffffffffffffffff})
fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000900)='trusted.overlay.upper\x00', &(0x7f0000000940)={0x0, 0xfb, 0x64, 0x6, 0x30, "9b9e639efc0e4894f694dbabb7513ef7", "c3f19e4e4cf788da60f81226ec97df95b68ab0c3f28c47af322dccb7c4f74cb2bfda1ebe863a84ed28ce5c8f6b07111f3944b61178445b6036af04621a86edbdbc479cddb648e1bab79f34e40673bd"}, 0x64, 0x3)
bind$rose(r4, &(0x7f00000009c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c)
r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ubi_ctrl\x00', 0x280020, 0x0)
write$binfmt_aout(r6, &(0x7f0000000a40)={{0x10b, 0x2, 0x4, 0x2db, 0x2a9, 0x4, 0x2, 0x80}, "fc0f6c4ee983f3d4591390b0465aa74b1f4dd18da492020bbbbbe8757444f09c53aa2d4a92acf7f0da3872dddf5a12b35191aa29d68a413c18bf92d2d2c87c2a485be63517544b25ec5dbeb6328fe38e3f6400db8b8c322ff1c5b55f8ee781cf92b314ee7bb9c52a2de8fd8f075cb30851458f9ed68511daa1967e506ef9c51f0489dbd6c4c2ebf652e8d71b0f09f05616831c8a33", [[], [], [], [], [], [], [], []]}, 0x8b5)
name_to_handle_at(0xffffffffffffffff, &(0x7f0000001300)='./file0/file0\x00', &(0x7f0000001340)={0x5b, 0x3f, "af960418cb65b848f5866ffa804180a1ad71212dcfe7d57d778acca4ade0e8ccd7c01a423595c68f52df045108c8b5846a15a71d42bb49833d24e65943c775d08034d3f64b51247512fa43868312ba5af2582f"}, &(0x7f00000013c0), 0x0)
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001400)={<r7=>0x0, 0x5}, &(0x7f0000001440)=0x8)
setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000001480)={r7, 0x7, 0x1, 0x7, 0x9, 0x7b97}, 0x14)
r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/btrfs-control\x00', 0x2a002, 0x0)
getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r8, 0x84, 0x12, &(0x7f0000001500), &(0x7f0000001540)=0x4)
r9 = inotify_init1(0x100000)
fremovexattr(r9, &(0x7f0000001580)=@random={'btrfs.', '/dev/ubi_ctrl\x00'})
r10 = dup3(0xffffffffffffffff, r3, 0x0)
setsockopt$inet6_int(r10, 0x29, 0x49, &(0x7f00000015c0)=0x8, 0x4)
r11 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001600)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0)
ioctl$KDSIGACCEPT(r11, 0x4b4e, 0x31)
ioctl$DRM_IOCTL_GET_MAP(r10, 0xc0286404, &(0x7f0000001640)={&(0x7f0000ff7000/0x6000)=nil, 0x3, 0x1, 0x88, &(0x7f0000ffb000/0x2000)=nil, 0x1})
r12 = getpgrp(0x0)
fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000001680)={0x1, 0x1, 0x100, 0x2, r12})
ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000016c0)=0x714d)
openat$audio1(0xffffffffffffff9c, &(0x7f0000001700)='/dev/audio1\x00', 0x80000, 0x0)

[  251.216507] selinux_nlmsg_perm: 679 callbacks suppressed
[  251.216516] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=60544 sclass=netlink_audit_socket pig=9700 comm=syz-executor.5
05:47:27 executing program 4:
r0 = socket$inet6(0xa, 0x1, 0x8010800000000084)
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000001200)=0x200, 0x4)
sendmmsg$inet6(r0, &(0x7f0000001100)=[{{&(0x7f0000000040)={0xa, 0x0, 0x19b, @rand_addr="a4eb5f401f7342de983f594fced50a4a"}, 0x1c, &(0x7f0000000000)=[{&(0x7f0000000080)='6', 0x1}], 0x1}}], 0x1, 0x4000040)

05:47:27 executing program 5:
openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10)
sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB='\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0)
syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0xc48, &(0x7f0000000c00)=[{&(0x7f0000000880)="487e78d91c2fb1c93b1bada1c911c80e2d675d391bfbe6cdf9f10f83065a2ff1d0f3e233e6953361cdb9111fe174e2114808426d0b416629fc55ba03444842aa1640581a6706927d7f24d0063fbfef52434e39cd8d8fc0fbbc363114c10da481187f4355a373edc92e65379505e15166094384c58f70c97260173fc22fc3e8dc6850297fdc32821b8de13ba306e3510e68d431ffe99a22926e2278e10f0cda629f170b096ab06a29ae52759dfa0a8fcc9b014aadb3fe38dfa0a4125f3ec56dc5339504baabfafad5dff5797df216f2a4c499ea7071258618d11bd46fe99185d43d52bbb389a872c24c2e8027ddc679", 0xef}, {&(0x7f0000000980)="853013f0caf558a8f1adcd36142200469225b3990113569e279aa68ee2d6030117bf6f3c89fddac3a1e594825063b94ba9e9741c7d9dc6d7ee41b18c3efe5e1572c4bb9daf49b2db7c14a5def580fea06e4977859acf7513159e08bd5c890d1d0890090a24507b1b608d1c44ddb6620025503de90922f7301361fbabcd6f0047ef7bd81f4d935bf5eb151b24eebb4235383e", 0x92, 0xffffffffffffffe1}, {&(0x7f0000000a40)="517de589a6c032ab8c22f940fea02866fd4337a3b7a2fafb1204c879a3744f24013001e46f4bbb859d50ae6bd35502c60710c04d717af64851a15fb5970d352dc182e870d42b11ec60a4857ab84ce7a60993b6e357d25462b487bc7f97fdc9e06a1641f8631c57162acabc67a9c8298803e62689072ed168a7002ae878d23989bd3e9d", 0x83, 0xecc5}, {&(0x7f0000000b00)="5a4c3b2f019c7138c9fa6bfd9fb8123dc84f0837ad6fc35907bc401c02288f1f2ae3c2cc945c49f7a1dfb657330bbf986afe88cfcc35dca183217b3b28a2025e1d809678", 0x44, 0x3f}, {&(0x7f0000000b80)="43298ef5797ef8b148cd1e414c6d0f7c2722e354dddeb30533a8bd34ea3f2e073e06341e5d91f9fca85e3494e451f8ff2a130f74099eb984780625e403b2cbe1e89341ee62348bd3f89e74d82c10d4126cfbbbf3927aa5a3eead9eb1f31aa33200", 0x61, 0xd9ac}], 0x10000, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"])
prctl$PR_SET_FPEXC(0xc, 0x40000)
socketpair$unix(0x1, 0x5, 0x0, 0x0)

[  251.307605] ISOFS: Unable to identify CD-ROM format.
[  251.463527] rdma_op ffff8880531196d8 conn xmit_rdma           (null)
05:47:27 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r2=>0xffffffffffffffff})
r3 = dup2(r2, r1)
sendmsg$AUDIT_LIST_RULES(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x3f5, 0x8, 0x70bd2c, 0x25dfdbfc, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x50}, 0x800)
r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x280040, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r4}}}}]}, 0x38}}, 0x0)
ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0)

05:47:27 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:27 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r3, 0x220, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0xfffffffa}, @NLBL_MGMT_A_DOMAIN={0x1b, 0x1, 'trusted+-$tlo^bdevuser\x00'}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8080}, 0x40010)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:27 executing program 2:
openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$bt_bnep(0x1f, 0x3, 0x4)
pipe(&(0x7f0000000000))
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r2 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00')
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r3, 0x0, 0x0, 0x20000003, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt(r3, 0x0, 0x4, 0x0, 0x0)
getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000340)={@local, <r4=>0x0}, &(0x7f00000004c0)=0x14)
r5 = socket$nl_netfilter(0x10, 0x3, 0xc)
r6 = dup(r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000500)={0x0, @loopback, @loopback}, &(0x7f0000000540)=0xc)
r7 = socket$nl_netfilter(0x10, 0x3, 0xc)
r8 = dup(r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
getsockname$packet(r8, &(0x7f0000000580)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14)
getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000600), &(0x7f0000000640)=0x4)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000b80)={@mcast1, <r10=>0x0}, &(0x7f0000000bc0)=0x14)
r11 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r11, 0x0, 0x0, 0x20000003, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt(r11, 0x0, 0x4, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x29, 0x22, &(0x7f0000000d80)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r12=>0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000e80)=0xe8)
r13 = socket$nl_route(0x10, 0x3, 0x0)
r14 = socket$nl_route(0x10, 0x3, 0x0)
r15 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, <r16=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r16, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aca6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0)
sendmsg$nl_route_sched(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB='$\x00\x00\x00*\x00\'\r\x009\x00\x00\x00%\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r16, @ANYBLOB="00000071e573e429ebc5cf0b3ef5a4d597d0000000000000d9b677dd00153688e27a4b56b1b7d88cf04502f51937471df268415342d194344e8a298ac6820ffa4f79af3ae3cb98d17b5689ddfd96589537c5fb56e9213e4b9c0194edf6ec03119f11ec5e666a70919f6607bb649e14de4710f8bf0441cc5d3517cf85c0cab2e45d25732adce62ae8d6a4f66071055add6e4a64870cff2d9443ba9dc90b8f2abfc28df90132ab069c419ef064035e3418904861212eeab5593b3a2605bf9a2e"], 0x24}}, 0x0)
r17 = socket$nl_netfilter(0x10, 0x3, 0xc)
r18 = dup(r17)
ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200)
getsockopt$PNPIPE_IFINDEX(r18, 0x113, 0x2, &(0x7f0000000680)=<r19=>0x0, &(0x7f00000006c0)=0x4)
sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001180)={&(0x7f0000000ec0)={0x25c, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x74}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x6, 0x81, 0x90, 0x81}, {0xfe, 0x7, 0x6, 0xfffffc01}, {0x7ff, 0x9, 0x24, 0x800}, {0x2, 0x9, 0x8a, 0x4}, {0x3ff, 0x8, 0x40, 0x7f}, {0x8, 0x3f, 0x1, 0x10000}, {0x1, 0x0, 0x7f, 0x100}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r10}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r16}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x25c}, 0x1, 0x0, 0x0, 0x8801}, 0x20004000)
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101080, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0xa000, 0x0)

[  251.659877] ISOFS: Unable to identify CD-ROM format.
05:47:27 executing program 5:
openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10)
sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB='\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0)
syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0xc48, &(0x7f0000000c00)=[{&(0x7f0000000880)="487e78d91c2fb1c93b1bada1c911c80e2d675d391bfbe6cdf9f10f83065a2ff1d0f3e233e6953361cdb9111fe174e2114808426d0b416629fc55ba03444842aa1640581a6706927d7f24d0063fbfef52434e39cd8d8fc0fbbc363114c10da481187f4355a373edc92e65379505e15166094384c58f70c97260173fc22fc3e8dc6850297fdc32821b8de13ba306e3510e68d431ffe99a22926e2278e10f0cda629f170b096ab06a29ae52759dfa0a8fcc9b014aadb3fe38dfa0a4125f3ec56dc5339504baabfafad5dff5797df216f2a4c499ea7071258618d11bd46fe99185d43d52bbb389a872c24c2e8027ddc679", 0xef}, {&(0x7f0000000980)="853013f0caf558a8f1adcd36142200469225b3990113569e279aa68ee2d6030117bf6f3c89fddac3a1e594825063b94ba9e9741c7d9dc6d7ee41b18c3efe5e1572c4bb9daf49b2db7c14a5def580fea06e4977859acf7513159e08bd5c890d1d0890090a24507b1b608d1c44ddb6620025503de90922f7301361fbabcd6f0047ef7bd81f4d935bf5eb151b24eebb4235383e", 0x92, 0xffffffffffffffe1}, {&(0x7f0000000a40)="517de589a6c032ab8c22f940fea02866fd4337a3b7a2fafb1204c879a3744f24013001e46f4bbb859d50ae6bd35502c60710c04d717af64851a15fb5970d352dc182e870d42b11ec60a4857ab84ce7a60993b6e357d25462b487bc7f97fdc9e06a1641f8631c57162acabc67a9c8298803e62689072ed168a7002ae878d23989bd3e9d", 0x83, 0xecc5}, {&(0x7f0000000b00)="5a4c3b2f019c7138c9fa6bfd9fb8123dc84f0837ad6fc35907bc401c02288f1f2ae3c2cc945c49f7a1dfb657330bbf986afe88cfcc35dca183217b3b28a2025e1d809678", 0x44, 0x3f}, {&(0x7f0000000b80)="43298ef5797ef8b148cd1e414c6d0f7c2722e354dddeb30533a8bd34ea3f2e073e06341e5d91f9fca85e3494e451f8ff2a130f74099eb984780625e403b2cbe1e89341ee62348bd3f89e74d82c10d4126cfbbbf3927aa5a3eead9eb1f31aa33200", 0x61, 0xd9ac}], 0x10000, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"])
prctl$PR_SET_FPEXC(0xc, 0x40000)
socketpair$unix(0x1, 0x5, 0x0, 0x0)

05:47:27 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:27 executing program 4:
clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff})
r4 = dup2(r3, r2)
ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [{0x35e}, {0xb91, 0x0, 0x7599}]})
r5 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000800)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0xe8, 0x0, 0x3b8, 0x3b8, 0x3b8, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x2d0}}, {{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x1e8}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ptmx_t:s0\x00'}}}, {{@arp={@multicast1, @broadcast, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x73a)
io_setup(0x6, &(0x7f0000000040)=<r6=>0x0)
io_cancel(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r10=>0xffffffffffffffff})
dup2(r10, r9)
io_submit(r6, 0x2, &(0x7f0000000240)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x7ff, r8, &(0x7f0000000080)="598655732ac15edbf6060ba463a54f19a640aa07666ef747e200574bcc9192374997da4eddfef169dfd8c3e119a0d77632db5d0d96b00bf2b7ef581a059d05115841394b626f31593dd94c9b", 0x4c, 0x8cc, 0x0, 0x0, r10}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x6, 0x9, r4, &(0x7f0000000180)="87c87ae4260df3ebe3729b06c10e42f7d9bb261c732ec6fc099bdf6acf0ebe050fdca2cbb7050271699a03a436b61b36c098f3e36666e626d654f05b66f46f45b5223f7caddb75c7a394bd9882515b9f81fb0f686b0ca1215d02ddc6a468", 0x5e, 0x0, 0x0, 0x3}])

05:47:27 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0xa000})
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = dup(r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x80000000)
ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "b70e5ecc078c3afa7bd74aaa65c47ee4bff30c593e63d771eb2625a4463794bd"})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_NMI(r2, 0xae9a)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  251.855655] ISOFS: Unable to identify CD-ROM format.
05:47:28 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  251.884503] rdma_op ffff88804fea9958 conn xmit_rdma           (null)
[  251.898374] kvm: emulating exchange as write
[  251.904106] xt_SECMARK: target only valid in the 'mangle' or 'security' tables, not 'filter'.
05:47:28 executing program 4:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000740)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000800)='/dev/bsg\x00', 0x0, 0x0)
setregid(0x0, 0x0)
setresgid(0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4)
bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10)
setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4)
recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001f1}, 0xd10c)
write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35)
r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
close(0xffffffffffffffff)
mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYPTR64=&(0x7f0000000b80)=ANY=[@ANYRES16=r1, @ANYRES64, @ANYBLOB="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", @ANYRESOCT, @ANYRESDEC=0x0, @ANYRESHEX=r2, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYBLOB="153d41333948a728f0c7d51063c3b57412adb14ca832d4fe0897054d299f9462a353bb4b30df35456cdddc4d991c49c37cdd1912095e864571f39626cd046ee8ef00f96026fec189c368bc8a47283dcb1ec5891078d3f7ae3d72c1c1a710570216a7363157dc46af590e5951861845de2941f2b1c4db8c70cf16df66010ac134c141c0a8b53a5af9a2d190e382204abf5bef1ff59c6542e5", @ANYRES64=r0, @ANYBLOB="894dae4dd4138dd07dcafa394e1d4e94b992fd148f93a3aed4dbc4d57d933ca233a226ab3d0c666d72348b6e68855ea2e5db4b3862", @ANYPTR, @ANYPTR64, @ANYRESDEC=0x0, @ANYRES64=r3, @ANYPTR, @ANYPTR], @ANYBLOB="d84670cfa1f540122d91ff0c2c6e82d405d31b1e84b5137cf086c1b8d85191ff563b666db2df2a877d84422b385e7eaa35976036130db7bf587da9740000000000004ee5364e1b4ead7c56a6d8eecdcda8a05f02619d50133ab8104c874e220a89ff583f042e49c5a08e68ccedb9244666150d26af3c16f1c65f001e06160dbd2c5637028f4972eb25fb826b43e928f4da0b16bae4a41b4b0e8b960472ddc61bdaa8be22b4660017a23565ba65667e6fc7f856f048fe07dc8d4413b69ff66f3c93a6b5697c9389b5ae10172d97d90e31e4ee34a0c663ff71fff8b1000000000000000000000000000000b1489fe55c83ccb6", @ANYRES32=0x0]])
umount2(&(0x7f0000000200)='./file0\x00', 0x1000000000000)

05:47:28 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000000))
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x0, 0x0)
getpid()
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(0xffffffffffffffff, &(0x7f0000000180), 0x10)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
shmctl$IPC_INFO(0x0, 0x3, 0x0)
stat(0x0, &(0x7f00000001c0))
socket$inet_udplite(0x2, 0x2, 0x88)
setgid(0x0)
r0 = socket(0x10, 0x0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r1=>0x0}, &(0x7f0000cab000)=0xc)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$setperm(0x5, 0x0, 0x202002)
keyctl$chown(0x4, 0x0, r1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
setgid(0x0)
r2 = getpid()
rt_tgsigqueueinfo(r2, 0x0, 0x16, 0x0)
ptrace(0x10, r2)
r3 = getpid()
rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0))
ptrace(0x10, r3)
ptrace$setregs(0xf, 0x0, 0x0, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9000000010001fff0000000020000457ce000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c0000580002800812000001000014000200fe8000000000000000000000000000aa0800080001000000080014002000000014000300ff02000000000000000043fc0000000108000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="56d5a3faf4ceefd48b8e1a2b6db4fb5e8c27a1c4d7075dc9e6d30db21dbb84e16579d36010d794832fa89c39d6005cc41be50b53ce821aeea7bd857b44793dca6f22a997ba1681c7bbbcfdfbf013a9599c9287b40cb05ae9f6a0e9e012a6996ccb8296061b8e37048e174dcf28a350d61ce725cb104f59fb5334d4db8ac410773100"/142], 0x90}}, 0x0)

[  251.965331] audit: type=1400 audit(1583387248.104:87): avc:  denied  { ioctl } for  pid=9730 comm="syz-executor.2" path="socket:[37080]" dev="sockfs" ino=37080 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  252.054557] ISOFS: Unable to identify CD-ROM format.
05:47:28 executing program 4:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00')
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x7)

05:47:28 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  252.146023] audit: type=1400 audit(1583387248.104:88): avc:  denied  { getopt } for  pid=9730 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  252.206917] audit: type=1400 audit(1583387248.104:89): avc:  denied  { getattr } for  pid=9730 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  252.236673] sp0: Synchronizing with TNC
05:47:28 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000017c0)='TIPC\x00')
sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="0105000000000000000001000000000000ca28410000001c0017004057000000000000006574683a6970365f767469300000"], 0x38}}, 0x0)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
dup2(0xffffffffffffffff, r4)
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f02000000f99d000000010000000014", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC=r3], @ANYRES64, @ANYRES64=r2, @ANYRES64=0x0, @ANYRESOCT=r0], 0x8}, 0x1, 0xfffffff0, 0x0, 0x24000445}, 0x0)
sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x10, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x4880)

[  252.278486] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'.
[  252.293905] ISOFS: Unable to identify CD-ROM format.
[  252.302714] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'.
[  252.404553] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'.
[  252.423589] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'.
05:47:28 executing program 2:
mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x0)
getpid()
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0)
accept4(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x80000)
bind$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x6, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
getpeername(0xffffffffffffffff, &(0x7f00000005c0)=@x25, &(0x7f0000000140)=0x80)
pipe(&(0x7f0000000840)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
pipe(&(0x7f0000000180)={<r4=>0xffffffffffffffff})
r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x100000, 0x0)
r6 = socket$nl_generic(0x10, 0x3, 0x10)
r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_MESH_CONFIG(r6, 0x0, 0x0)
sendmsg$NL80211_CMD_TRIGGER_SCAN(r5, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)={0xc4, r7, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_SCHED_SCAN_MATCH={0xb0, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x2c, 0x6, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x8, 0x0, 0x1}, @NL80211_BAND_60GHZ={0x8, 0x2, 0x1}, @NL80211_BAND_2GHZ={0x8, 0x0, 0xd0}, @NL80211_BAND_2GHZ={0x8, 0x0, 0x6}, @NL80211_BAND_60GHZ={0x8, 0x2, 0xfffffffe}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x7}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @dev={[], 0x44}}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x34, 0x6, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x8, 0x2, 0x16}, @NL80211_BAND_6GHZ={0x8, 0x3, 0xe}, @NL80211_BAND_2GHZ={0x8, 0x0, 0x1}, @NL80211_BAND_6GHZ={0x8, 0x3, 0xffffff00}, @NL80211_BAND_60GHZ={0x8, 0x2, 0x9}, @NL80211_BAND_2GHZ={0x8, 0x0, 0x7}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xc, 0x1, "7a5fd7eba6ac9690"}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0xfffff000}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x23, 0x1, "5c02c647807e6cfaf41b3344908e24a792378e9842c5729870ef9b41a04806"}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40}, 0x40)
vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
recvfrom(r4, &(0x7f00000002c0)=""/245, 0xf5, 0x1, 0x0, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0)
getxattr(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="3884f47c6eb0266046b02e1d17a209d25bd60ed3b1e8be8197b2804b078544d85c41f25652f8de99f706614aa4cf2694616190e8690803ff8d9b445f83ff856663642dc1e7242de3c4af7752d6f4f2d2ca6edda7fff81aa6755ddb813ea447626ca24dd03efe85be80b3f7b9b8efb08a8372d180bb6e58e788489857d3d319ac9d0fad802c54823678619db9a6f337c5763155e7d658277e4ffff5e1affe53a5f6bbcfe8312de7"], 0x0, 0x0)
r8 = gettid()
r9 = creat(&(0x7f0000000280)='./file0\x00', 0x1)
write$binfmt_script(r9, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/917], 0x129)
prctl$PR_SET_PTRACER(0x59616d61, r8)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r9)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r8, 0x0, 0x0)

05:47:28 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:28 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r3, 0x220, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0xfffffffa}, @NLBL_MGMT_A_DOMAIN={0x1b, 0x1, 'trusted+-$tlo^bdevuser\x00'}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8080}, 0x40010)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:28 executing program 4:
socket$inet6(0xa, 0x2, 0x0)
r0 = socket$key(0xf, 0x3, 0x2)
prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0)
r1 = getpid()
sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r2 = socket(0x29, 0x4, 0x85)
r3 = socket$inet(0x2, 0x4000000805, 0x0)
r4 = socket$inet_sctp(0x2, 0x5, 0x84)
r5 = dup3(r3, r4, 0x0)
r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x8500, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10)
sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
sendmsg$RDMA_NLDEV_CMD_SYS_GET(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000)
sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="42000063efd544fde188927470d79d39e760102e2a43c682ceefd4f7ff9f", @ANYRES32=0x0, @ANYRES32=<r7=>0x0], &(0x7f0000a8a000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6c, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400)={r7}, 0x0)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r7, 0x1599beaf}, &(0x7f00000003c0)=0x8)
getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000005c0)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000100)=0xcc)
r8 = socket$inet6(0xa, 0x3, 0x7)
recvmmsg(r8, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0)
r9 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c)
sendmmsg(r9, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0xe00)
getpeername$inet6(r9, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r10=>0xffffffffffffffff, <r11=>0xffffffffffffffff})
r12 = socket$inet6_tcp(0xa, 0x1, 0x0)
r13 = fcntl$dupfd(r12, 0x0, r12)
ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200)
ftruncate(r13, 0x282ad7b1)
fcntl$setpipe(r11, 0x407, 0x0)
write(r11, &(0x7f0000000340), 0x41395527)
vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket$key(0xf, 0x3, 0x2)
add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
clock_nanosleep(0x2, 0x1, 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0xc0045005, &(0x7f0000000000)=0x10)
sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900fd0000000a00000000000000000200000000000000000200010000000000000000fd000000000d00053b91814dce4c00000000000a00000000000000ff02000000000000000000000000000100000000000000005be4d2cc51bad747d639f35a51b91133b0448e31b915fa06083519741c09eaa1600d82ca1a524b3df05158eaf4d19fd792ce7e732e7b34f3a0eb69841ed766f50a98a41710b0aab7b9a77b4f9a6f6de745260aa37cd51264aba40000000000"], 0x98}}, 0x0)

05:47:28 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r5, &(0x7f0000001400)="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", 0x2e6)
sendfile(r5, r6, 0x0, 0x10000)

05:47:28 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r1=>0x0)
sendto$phonet(0xffffffffffffffff, &(0x7f0000000100)="3ad95e89f5bdabb7149b762fe5533ed778285a4196100d4f9c22f2fb7f3000f2a05cb049a0558073201859de35de92fbaffc10435ec64ae82c4513b3f024908fa57ce6c3938a90104d6c162144c8a10822b0e870f1ff02d2ca1711ee79accb35005547b1c89b5f80b43346817fb9c705773095e0265dfcfdbf1d416d", 0x7c, 0x2, &(0x7f0000000200)={0x23, 0x2, 0x2, 0x5f}, 0x10)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xe0b7})
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}])
r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0)
read(r2, &(0x7f0000000180)=""/19, 0xfffffe47)
socket$bt_bnep(0x1f, 0x3, 0x4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vcs\x00', 0x290003, 0x0)
r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r3, 0x88001)
socket$inet_smc(0x2b, 0x1, 0x0)
write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x3ba}, 0x7)
openat$uinput(0xffffffffffffff9c, &(0x7f0000001340)='/dev/uinput\x00', 0x2, 0x0)
r4 = socket(0x11, 0x3, 0x0)
setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4)
bind(r4, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
sendfile(r4, r5, 0x0, 0xffffffff010)
sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0)

[  252.823636] ISOFS: Unable to identify CD-ROM format.
[  252.854930] audit: type=1804 audit(1583387248.994:90): pid=9833 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir550904960/syzkaller.oFfPzf/106/file0/file0" dev="loop5" ino=159 res=1
05:47:29 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r5, &(0x7f0000001400)="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", 0x2e6)
sendfile(r5, r6, 0x0, 0x10000)

05:47:29 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  253.347473] audit: type=1804 audit(1583387249.404:91): pid=9861 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir295195572/syzkaller.gVM8Bb/77/bus" dev="sda1" ino=16698 res=1
05:47:29 executing program 4:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140), 0x0, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  253.462454] ISOFS: Unable to identify CD-ROM format.
05:47:29 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020", 0x41, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  253.544961] ISOFS: Unable to identify CD-ROM format.
05:47:29 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r1=>0x0)
sendto$phonet(0xffffffffffffffff, &(0x7f0000000100)="3ad95e89f5bdabb7149b762fe5533ed778285a4196100d4f9c22f2fb7f3000f2a05cb049a0558073201859de35de92fbaffc10435ec64ae82c4513b3f024908fa57ce6c3938a90104d6c162144c8a10822b0e870f1ff02d2ca1711ee79accb35005547b1c89b5f80b43346817fb9c705773095e0265dfcfdbf1d416d", 0x7c, 0x2, &(0x7f0000000200)={0x23, 0x2, 0x2, 0x5f}, 0x10)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xe0b7})
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}])
r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0)
read(r2, &(0x7f0000000180)=""/19, 0xfffffe47)
socket$bt_bnep(0x1f, 0x3, 0x4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vcs\x00', 0x290003, 0x0)
r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r3, 0x88001)
socket$inet_smc(0x2b, 0x1, 0x0)
write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x3ba}, 0x7)
openat$uinput(0xffffffffffffff9c, &(0x7f0000001340)='/dev/uinput\x00', 0x2, 0x0)
r4 = socket(0x11, 0x3, 0x0)
setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4)
bind(r4, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
sendfile(r4, r5, 0x0, 0xffffffff010)
sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0)

05:47:29 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r3, 0x220, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0xfffffffa}, @NLBL_MGMT_A_DOMAIN={0x1b, 0x1, 'trusted+-$tlo^bdevuser\x00'}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8080}, 0x40010)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  253.582220] audit: type=1804 audit(1583387249.724:92): pid=9876 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir550904960/syzkaller.oFfPzf/107/file0/file0" dev="loop5" ino=162 res=1
[  253.589635] ISOFS: Logical zone size(0) < hardware blocksize(1024)
[  253.804194] audit: type=1804 audit(1583387249.944:93): pid=9900 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir295195572/syzkaller.gVM8Bb/78/bus" dev="sda1" ino=16695 res=1
05:47:31 executing program 4:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r1=>0x0)
sendto$phonet(0xffffffffffffffff, &(0x7f0000000100)="3ad95e89f5bdabb7149b762fe5533ed778285a4196100d4f9c22f2fb7f3000f2a05cb049a0558073201859de35de92fbaffc10435ec64ae82c4513b3f024908fa57ce6c3938a90104d6c162144c8a10822b0e870f1ff02d2ca1711ee79accb35005547b1c89b5f80b43346817fb9c705773095e0265dfcfdbf1d416d", 0x7c, 0x2, &(0x7f0000000200)={0x23, 0x2, 0x2, 0x5f}, 0x10)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xe0b7})
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}])
r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0)
read(r2, &(0x7f0000000180)=""/19, 0xfffffe47)
socket$bt_bnep(0x1f, 0x3, 0x4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vcs\x00', 0x290003, 0x0)
r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r3, 0x88001)
socket$inet_smc(0x2b, 0x1, 0x0)
write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x3ba}, 0x7)
openat$uinput(0xffffffffffffff9c, &(0x7f0000001340)='/dev/uinput\x00', 0x2, 0x0)
r4 = socket(0x11, 0x3, 0x0)
setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4)
bind(r4, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
sendfile(r4, r5, 0x0, 0xffffffff010)
sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0)

05:47:31 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r5, &(0x7f0000001400)="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", 0x2e6)
sendfile(r5, r6, 0x0, 0x10000)

05:47:31 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020", 0x41, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:31 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r1=>0x0)
sendto$phonet(0xffffffffffffffff, &(0x7f0000000100)="3ad95e89f5bdabb7149b762fe5533ed778285a4196100d4f9c22f2fb7f3000f2a05cb049a0558073201859de35de92fbaffc10435ec64ae82c4513b3f024908fa57ce6c3938a90104d6c162144c8a10822b0e870f1ff02d2ca1711ee79accb35005547b1c89b5f80b43346817fb9c705773095e0265dfcfdbf1d416d", 0x7c, 0x2, &(0x7f0000000200)={0x23, 0x2, 0x2, 0x5f}, 0x10)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xe0b7})
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}])
r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0)
read(r2, &(0x7f0000000180)=""/19, 0xfffffe47)
socket$bt_bnep(0x1f, 0x3, 0x4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vcs\x00', 0x290003, 0x0)
r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r3, 0x88001)
socket$inet_smc(0x2b, 0x1, 0x0)
write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x3ba}, 0x7)
openat$uinput(0xffffffffffffff9c, &(0x7f0000001340)='/dev/uinput\x00', 0x2, 0x0)
r4 = socket(0x11, 0x3, 0x0)
setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4)
bind(r4, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
sendfile(r4, r5, 0x0, 0xffffffff010)
sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0)

05:47:31 executing program 2:
r0 = shmget(0x0, 0x2000, 0x1, &(0x7f0000ffe000/0x2000)=nil)
shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x2000)
r1 = socket$kcm(0x10, 0x2, 0x4)
sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000380)="480000001500e702095f9f95274b0a000a840200406fab078a6a36d47a56aa68c6f8c3762be854497626ff00034000d90000000000000000634310c68b0c89", 0x3f}, {&(0x7f00000001c0)="ac8c3533f58775e158", 0x9}], 0x2}, 0x0)

05:47:31 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  255.877957] audit: type=1804 audit(1583387252.014:94): pid=9921 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir109746098/syzkaller.wfNh8h/103/bus" dev="sda1" ino=16713 res=1
[  255.913339] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:32 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x1000)
ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000200)={0x8, 0x28d})
read$usbfs(0xffffffffffffffff, &(0x7f0000000540)=""/56, 0x38)
getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000800)=""/4096, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000280)}, 0x4040001)
syz_init_net_socket$x25(0x9, 0x5, 0x0)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3)
setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4)
sendto$inet(r1, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r2 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
sendmsg$nl_route_sched(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRES64, @ANYPTR64, @ANYRES32], @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESOCT], @ANYRESHEX=0x0], 0x3}, 0x1, 0x0, 0x0, 0x28004895}, 0x4040001)
lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="bfcd062f7215bad8e82eed366a73f26a61", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYBLOB="0400000000933e1e9a000200", @ANYRES32=0x0], 0x6, 0x2)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
fstat(r0, &(0x7f0000000580))
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707042726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c652c776f726b6469721d2e2f66696c643100"])
remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x6, 0x2000)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0)

05:47:32 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020", 0x41, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  255.938133] audit: type=1804 audit(1583387252.074:95): pid=9918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir295195572/syzkaller.gVM8Bb/79/bus" dev="sda1" ino=16714 res=1
05:47:32 executing program 4:
r0 = socket(0x11, 0xa, 0x0)
recvfrom$packet(r0, 0x0, 0x0, 0x1063, 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
socket(0xf, 0x5, 0x1f)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000000)={0x10, 0x5, {0x57, 0xc3, 0x0, {0x800, 0xff}, {0x55b9, 0x7}, @const={0x9, {0x5, 0x5, 0x7fff}}}, {0x57, 0x5, 0x4, {0x1f, 0x100}, {0x0, 0x2}, @rumble={0xfffa, 0x3ff}}})

05:47:32 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r5, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)
sendfile(r5, r6, 0x0, 0x10000)

[  256.023211] audit: type=1804 audit(1583387252.124:96): pid=9916 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir550904960/syzkaller.oFfPzf/108/file0/file0" dev="sda1" ino=16716 res=1
05:47:32 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r1=>0x0)
sendto$phonet(0xffffffffffffffff, &(0x7f0000000100)="3ad95e89f5bdabb7149b762fe5533ed778285a4196100d4f9c22f2fb7f3000f2a05cb049a0558073201859de35de92fbaffc10435ec64ae82c4513b3f024908fa57ce6c3938a90104d6c162144c8a10822b0e870f1ff02d2ca1711ee79accb35005547b1c89b5f80b43346817fb9c705773095e0265dfcfdbf1d416d", 0x7c, 0x2, &(0x7f0000000200)={0x23, 0x2, 0x2, 0x5f}, 0x10)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xe0b7})
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}])
r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0)
read(r2, &(0x7f0000000180)=""/19, 0xfffffe47)
socket$bt_bnep(0x1f, 0x3, 0x4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vcs\x00', 0x290003, 0x0)
r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r3, 0x88001)
socket$inet_smc(0x2b, 0x1, 0x0)
write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x3ba}, 0x7)
openat$uinput(0xffffffffffffff9c, &(0x7f0000001340)='/dev/uinput\x00', 0x2, 0x0)
r4 = socket(0x11, 0x3, 0x0)
setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4)
bind(r4, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
sendfile(r4, r5, 0x0, 0xffffffff010)
sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0)

[  256.112310] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:32 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00"/98, 0x62, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x404}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}]}}}]}, 0x38}}, 0x0)

[  256.322167] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:32 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0xc020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x511080, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xc0d6, 0x0, 0x0, 0x200000, {}, {}, {}, {}, 0x0, 0x141, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0xfffffffe})
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff})
dup2(r3, r2)
ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000340)={"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"})
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x80000, 0x0)
r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x1c})
ioctl$UI_DEV_CREATE(r4, 0x5501)
ioctl$UI_DEV_DESTROY(r4, 0x5502)
r5 = fcntl$dupfd(r1, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e22, 0xff, @ipv4={[], [], @multicast1}, 0x2}, {0xa, 0x4e24, 0x400, @rand_addr="9c1b479dfe80b08907442d43afb38f8c", 0x3}, 0x7, [0x80000000, 0x1, 0xfffff001, 0x8000, 0x8, 0x82d, 0x7, 0x1]}, 0x5c)

[  256.366433] audit: type=1804 audit(1583387252.504:97): pid=9956 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir550904960/syzkaller.oFfPzf/109/file0/file0" dev="loop5" ino=193 res=1
05:47:32 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0)
write$9p(r5, &(0x7f0000001400)="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", 0x2e6)

05:47:32 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00"/98, 0x62, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  256.484229] audit: type=1804 audit(1583387252.564:98): pid=9960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir295195572/syzkaller.gVM8Bb/80/bus" dev="sda1" ino=16709 res=1
05:47:32 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x404}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}]}}}]}, 0x38}}, 0x0)

[  256.538269] input: syz1 as /devices/virtual/input/input7
05:47:32 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="20002cbd7000fddbdf25060000000800024007000000080002000700000008000700fffffffffe7f34c7023295927c45837e1f039504c0903056bb6d9999c64539bc57cb909bf38929e3c532531f77bf3309d02040575052569bcc69afe502bb08a5351069585afafa153e42bf2bc1ea87b40f0f85b6344a54e8bccd8a011e525f4b0e15ea0b5d171844c9f5012f50c7efd2c32a9a49e7ed0fc83d1cdd3f4257896e9194f0a9e5531bee165d64dea93c7bf02ead4c2dab03daed0f1ce849df3e08e0f0713322455b1e4505add59ffd99759d4432e11bfb25df85ef30fc5c71a3c2eb70a2cba90bddbf716be26025509cc99596cf4ace760d3548d18b38fbf08a28fab9bd9498c8f470d3ec4e2fb1495959"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:32 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x0)
io_setup(0x1ff, &(0x7f00000004c0)=<r1=>0x0)
sendto$phonet(0xffffffffffffffff, &(0x7f0000000100)="3ad95e89f5bdabb7149b762fe5533ed778285a4196100d4f9c22f2fb7f3000f2a05cb049a0558073201859de35de92fbaffc10435ec64ae82c4513b3f024908fa57ce6c3938a90104d6c162144c8a10822b0e870f1ff02d2ca1711ee79accb35005547b1c89b5f80b43346817fb9c705773095e0265dfcfdbf1d416d", 0x7c, 0x2, &(0x7f0000000200)={0x23, 0x2, 0x2, 0x5f}, 0x10)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xe0b7})
io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}])
r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0)
read(r2, &(0x7f0000000180)=""/19, 0xfffffe47)
socket$bt_bnep(0x1f, 0x3, 0x4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/vcs\x00', 0x290003, 0x0)
r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r3, 0x88001)
socket$inet_smc(0x2b, 0x1, 0x0)
write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x3ba}, 0x7)
openat$uinput(0xffffffffffffff9c, &(0x7f0000001340)='/dev/uinput\x00', 0x2, 0x0)
r4 = socket(0x11, 0x3, 0x0)
setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4)
bind(r4, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
sendfile(r4, r5, 0x0, 0xffffffff010)
sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0)

[  256.666081] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:32 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:32 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0xc020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x511080, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xc0d6, 0x0, 0x0, 0x200000, {}, {}, {}, {}, 0x0, 0x141, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0xfffffffe})
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff})
dup2(r3, r2)
ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000340)={"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"})
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x80000, 0x0)
r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x1c})
ioctl$UI_DEV_CREATE(r4, 0x5501)
ioctl$UI_DEV_DESTROY(r4, 0x5502)
r5 = fcntl$dupfd(r1, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e22, 0xff, @ipv4={[], [], @multicast1}, 0x2}, {0xa, 0x4e24, 0x400, @rand_addr="9c1b479dfe80b08907442d43afb38f8c", 0x3}, 0x7, [0x80000000, 0x1, 0xfffff001, 0x8000, 0x8, 0x82d, 0x7, 0x1]}, 0x5c)

[  256.753363] audit: type=1804 audit(1583387252.894:99): pid=9995 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir295195572/syzkaller.gVM8Bb/81/bus" dev="sda1" ino=16712 res=1
05:47:32 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00"/98, 0x62, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:33 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r5, &(0x7f0000001400)="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", 0x2e6)

[  256.896772] audit: type=1804 audit(1583387252.964:100): pid=9996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir550904960/syzkaller.oFfPzf/110/file0/file0" dev="loop5" ino=209 res=1
[  256.919024] ISOFS: Logical zone size(0) < hardware blocksize(1024)
[  256.942239] input: syz1 as /devices/virtual/input/input8
05:47:33 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0xc020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x511080, 0x0)
ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xc0d6, 0x0, 0x0, 0x200000, {}, {}, {}, {}, 0x0, 0x141, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0xfffffffe})
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff})
dup2(r3, r2)
ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000340)={"4713db540e02a0ba5517923750f910a1b76835c6800d446dc1a08c621bc8484544b423ee40fc28a59d1f1191e0969f9cd257abf207e51571637dd23ee90bb5616eae4399ac511cb97b289ef93ce12f8a631d5885a4bd2f2712468db50049de5e297dcfc4e8c35fd534180c445a7d3922888509765f2d46e14fd113e09c621e9d7db265fc202ac288c0659f4239dd6933f089f5f283c19cec8e926b548b19af8eea4b07d9f6687bc1f37477e8ddb20ebfd7a38496669052cd3d3641a5ca3014da665f779c54d41cc463970fabcb863664ccf0c4074b9f23d132255c81471b1e49ecd550119a625898d574716ce9746f2a0d64d5707bc8e2b295904322a6671e0072a734a88cf5f32af6cef0c05764c7ee1682bce2e3f9afb9f27fd5b59aad351bbdde62549ca88ffa1dcfe50d8d6c1f646a9e5fbc7dbd971ab308ba8ba7c5b623a16f7f2a820a7af133a509d022a2a0e75dab165ccdbc8a6d1aa5510fd1106b9d8d18b742e4a5017282fb90f3300239e014e20bd983684ea522c867214ce67b3542cbade200a59bd518f39fc2452a578ade3f6c69f304d8812380ce754053cbfeed39e807ec1d81dd7987fa72b5bdc9e6cba3ae28288fe1b13edc9a51e9fdb48cce6b16190a458aaf63c8cea557f1f6e7f7a4df2401a4cb155fa141dce045fe418c8985a1575d613f8fe546e4a881bc0617b3bb77c09b496c4f25124fc1813f0b2831526d41386ec392c7629e2c164150cbc125bab837e790af65c58fe3655f9a0aef315bebaef31fc457e55d2dff47f8136844bfef2564f3526a77aac8710d215478c35d7e0cb3fbdedb610540cd537b3461e3ddb52d13a0080d08d520f6a6e7fb38ff245e6e77df84addda109e1b12205c2df384f2912c3120e5dabbb79477e9538d04bd5ab0debc4345948b7eb824e8ceebeb5c71516ff52eb3288cefb8cc53821d818ba10bd53aac1790b576fdd2f1b45bf8cc41b449423073cfbbb931bf3639b6897ec886415ca4b21f4cf23203c12d7e175465026d98076a86a08768f749a5da0ff4ec42d8c7affe37bb94a78efca817c0863f34aefd1fb39d2fd5810a7521e8cb2df3c5d3de0c70eef02cf4016afacc7b9fe9405abf9d46d2dcf41f1a8b0425e798fd5fc4b28bf1090161ac92b8bcff77dfa0f80254421d82d784c4833ce6379de2148bd3a67c4d7611f379b1b852ae83e2561be498c21fd076c5fcec622680a6fd3a858096ef8ce5f39e7e5bc69b81ae31d0e28695f5962774f3efc6f0167167be0df243093f81ceb17daddb11cf5f44e096cc6c1f47fbf010d6e0e24be0c1840bf42064aa45bbb542b6ee2e9704f7ea6d5457ed8f9fbd14a1bc20d6b47d388a431c58dc68fb4fa6dfdf57430d56f74ebff3a2d87dd326c6eda4b586208bfbae21be2253fcd2038ee955f006eb306c694042745500c497424ce854865"})
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x80000, 0x0)
r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x1c})
ioctl$UI_DEV_CREATE(r4, 0x5501)
ioctl$UI_DEV_DESTROY(r4, 0x5502)
r5 = fcntl$dupfd(r1, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e22, 0xff, @ipv4={[], [], @multicast1}, 0x2}, {0xa, 0x4e24, 0x400, @rand_addr="9c1b479dfe80b08907442d43afb38f8c", 0x3}, 0x7, [0x80000000, 0x1, 0xfffff001, 0x8000, 0x8, 0x82d, 0x7, 0x1]}, 0x5c)

05:47:33 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:33 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00"/114, 0x72, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:33 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
write$9p(0xffffffffffffffff, &(0x7f0000001400)="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", 0x2e6)

[  257.148868] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:33 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00"/114, 0x72, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  257.202233] input: syz1 as /devices/virtual/input/input9
05:47:33 executing program 2:
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRES16, @ANYBLOB="210200e61dbc01713a0c83646268000000e1ffdfff000000080800010a76bd9efca60fe90c"], 0x3}}, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
exit(0x2)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000004c0)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0)
mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x17fffff, 0x2010, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
dup(r4)
r5 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10)
connect$inet(r5, &(0x7f0000000400)={0x2, 0x0, @broadcast}, 0x10)
sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f)
sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)
dup(0xffffffffffffffff)

[  257.344045] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:33 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
write$9p(0xffffffffffffffff, &(0x7f0000001400)="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", 0x2e6)

05:47:33 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00"/114, 0x72, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:33 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="20002cbd7000fddbdf25060000000800024007000000080002000700000008000700fffffffffe7f34c7023295927c45837e1f039504c0903056bb6d9999c64539bc57cb909bf38929e3c532531f77bf3309d02040575052569bcc69afe502bb08a5351069585afafa153e42bf2bc1ea87b40f0f85b6344a54e8bccd8a011e525f4b0e15ea0b5d171844c9f5012f50c7efd2c32a9a49e7ed0fc83d1cdd3f4257896e9194f0a9e5531bee165d64dea93c7bf02ead4c2dab03daed0f1ce849df3e08e0f0713322455b1e4505add59ffd99759d4432e11bfb25df85ef30fc5c71a3c2eb70a2cba90bddbf716be26025509cc99596cf4ace760d3548d18b38fbf08a28fab9bd9498c8f470d3ec4e2fb1495959"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:33 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:33 executing program 2:
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRES16, @ANYBLOB="210200e61dbc01713a0c83646268000000e1ffdfff000000080800010a76bd9efca60fe90c"], 0x3}}, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
exit(0x2)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000004c0)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0)
mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x17fffff, 0x2010, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
dup(r4)
r5 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10)
connect$inet(r5, &(0x7f0000000400)={0x2, 0x0, @broadcast}, 0x10)
sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f)
sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)
dup(0xffffffffffffffff)

[  257.791566] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:34 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00000000000000000000000000000000000000000000000000000000000000000100", 0x7a, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:34 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:34 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
write$9p(0xffffffffffffffff, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:34 executing program 2:
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00')
sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRES16, @ANYBLOB="210200e61dbc01713a0c83646268000000e1ffdfff000000080800010a76bd9efca60fe90c"], 0x3}}, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000300)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0)
exit(0x2)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000004c0)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0)
mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x17fffff, 0x2010, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
dup(r4)
r5 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10)
connect$inet(r5, &(0x7f0000000400)={0x2, 0x0, @broadcast}, 0x10)
sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f)
sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)
dup(0xffffffffffffffff)

05:47:34 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00000000000000000000000000000000000000000000000000000000000000000100", 0x7a, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:34 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00000000000000000000000000000000000000000000000000000000000000000100", 0x7a, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  258.266956] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:34 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r4)
r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r5, &(0x7f0000001400)="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", 0x2e6)

05:47:34 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f0000000000000000000000000000000000000000000000000000000000000000010000010100", 0x7e, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  258.405276] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:34 executing program 2:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00000000000000000000000000000000000000000000000000000000000000000100", 0x7a, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:34 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:34 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:34 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="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", 0x2e6)

05:47:34 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:35 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f0000000000000000000000000000000000000000000000000000000000000000010000010100", 0x7e, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  258.820813] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:35 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="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", 0x2e6)

[  258.943210] ISOFS: Logical zone size(0) < hardware blocksize(1024)
[  259.051854] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:35 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:35 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f0000000000000000000000000000000000000000000000000000000000000000010000010100", 0x7e, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:35 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:35 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
fchdir(0xffffffffffffffff)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="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", 0x2e6)

[  259.251228] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:35 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00000000000000000000000000000000000000000000000000000000000000000100000101000001", 0x80, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:35 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
fchdir(0xffffffffffffffff)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="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", 0x2e6)

[  259.427821] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:35 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:35 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:35 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00000000000000000000000000000000000000000000000000000000000000000100000101000001", 0x80, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:35 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
r0 = socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4)
fchdir(0xffffffffffffffff)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="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", 0x2e6)

05:47:35 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)
sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x54, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0x36, 0x1, 'nodevselinuxnusercpusetselinux@eth1em0eth0{*wlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0)

05:47:35 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="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", 0x2e6)

[  259.750954] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:36 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:36 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00000000000000000000000000000000000000000000000000000000000000000100000101000001", 0x80, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:36 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r1, 0x0, r1)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

[  260.039601] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:36 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f0000000000000000000000000000000000000000000000000000000000000000010000010100000100", 0x81, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:36 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r1, 0x0, r1)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:36 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f0000000000000000000000000000000000000000000000000000000000000000010000010100000100", 0x81, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  260.153776] ISOFS: Logical zone size(0) < hardware blocksize(1024)
[  260.307684] ISOFS: Logical zone size(0) < hardware blocksize(1024)
05:47:36 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r1, 0x0, r1)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:36 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:36 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f0000000000000000000000000000000000000000000000000000000000000000010000010100000100", 0x81, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:36 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB='\b\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x90}, 0x44000)

05:47:36 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:36 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  260.588108] ISOFS: Logical zone size(0) < hardware blocksize(1024)
[  260.720774] ISOFS: Unable to identify CD-ROM format.
05:47:37 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:37 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="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", 0x2e6)

05:47:37 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:37 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="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", 0x2e6)

[  260.915496] ISOFS: Unable to identify CD-ROM format.
05:47:37 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:37 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  261.063608] ISOFS: Unable to identify CD-ROM format.
05:47:37 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:37 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:37 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:37 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00')

05:47:37 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:37 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:37 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:37 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:37 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:37 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:37 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:38 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="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", 0x2e6)

[  261.941170] ISOFS: unable to read i-node block
05:47:38 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:38 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="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", 0x2e6)

05:47:38 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  262.128146] ISOFS: unable to read i-node block
05:47:38 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r0=>0xffffffffffffffff}, 0x111, 0x8}}, 0x20)
write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r0}}, 0xc)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r4, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:38 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:38 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
creat(&(0x7f0000000080)='./file0\x00', 0x0)

[  262.295433] ISOFS: unable to read i-node block
05:47:38 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:38 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:38 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:38 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111, 0x8}}, 0x20)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:38 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111, 0x8}}, 0x20)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:38 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  262.603513] ISOFS: unable to read i-node block
05:47:38 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  262.760359] ISOFS: unable to read i-node block
05:47:38 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:39 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:39 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  262.956149] ISOFS: unable to read i-node block
05:47:39 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:39 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)

[  263.156692] ISOFS: unable to read i-node block
05:47:39 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:39 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:39 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:39 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:39 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  263.420684] ISOFS: unable to read i-node block
05:47:39 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:39 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  263.595352] ISOFS: unable to read i-node block
05:47:39 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:39 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:39 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:40 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:40 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:40 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
socket(0x0, 0x2, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:40 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500))

05:47:40 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:40 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:40 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, 0x0, 0x0)

05:47:40 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:40 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, 0x0, 0x0)

05:47:40 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:40 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, 0x0, 0x0)

05:47:40 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4040000)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:41 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:41 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[], 0x0)

05:47:41 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(0xffffffffffffffff, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:41 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)

05:47:41 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:41 executing program 5:
socket$inet_dccp(0x2, 0x6, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:41 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[], 0x0)

05:47:41 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:41 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[], 0x0)

05:47:41 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:41 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0)

05:47:41 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:41 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:41 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0)

05:47:41 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:42 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:42 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:42 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0)

05:47:42 executing program 5:
syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:42 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:42 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:42 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='\f\x00\x00\x00\x00\x00'], 0x0)

05:47:42 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:42 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:42 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:42 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:42 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:42 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:42 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='\f\x00\x00\x00\x00\x00'], 0x0)

05:47:42 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:42 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:43 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='\f\x00\x00\x00\x00\x00'], 0x0)

05:47:43 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:43 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:43 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001"], 0x0)

[  266.990247] FAT-fs (loop5): bogus number of reserved sectors
[  267.000715] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:43 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:43 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:43 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:43 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:43 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001"], 0x0)

05:47:43 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:43 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

[  267.434901] FAT-fs (loop5): bogus number of reserved sectors
[  267.443205] FAT-fs (loop5): Can't find a valid FAT filesystem
[  267.568439] FAT-fs (loop5): bogus number of reserved sectors
[  267.575875] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:43 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:43 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001"], 0x0)

05:47:43 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:43 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:43 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  267.736060] FAT-fs (loop5): bogus number of reserved sectors
[  267.745864] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:43 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd"], 0x0)

05:47:44 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:44 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:44 executing program 3:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:44 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd"], 0x0)

05:47:44 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:44 executing program 3:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  268.281337] FAT-fs (loop5): bogus number of reserved sectors
[  268.294784] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:44 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:44 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:44 executing program 3:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:44 executing program 0:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd"], 0x0)

05:47:44 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:44 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:44 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:44 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:44 executing program 3:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  268.572867] FAT-fs (loop5): bogus number of reserved sectors
05:47:44 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  268.617948] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:44 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:44 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:44 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000380), 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:44 executing program 3:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:44 executing program 1:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:44 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  268.818298] FAT-fs (loop5): bogus number of reserved sectors
05:47:45 executing program 3:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  268.867020] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:45 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000380), 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:45 executing program 1:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:45 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:45 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  268.999231] FAT-fs (loop5): bogus number of reserved sectors
[  269.009470] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:45 executing program 1:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:45 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:45 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:45 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:45 executing program 1:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:45 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000380), 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:45 executing program 1:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:45 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:45 executing program 1:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:45 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  269.703937] FAT-fs (loop5): bogus number of reserved sectors
[  269.729566] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:46 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:46 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{0x0}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:46 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  269.913973] FAT-fs (loop5): bogus number of reserved sectors
[  269.928780] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:46 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:46 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:46 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:46 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{0x0}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:46 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:46 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:46 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  270.526403] FAT-fs (loop5): bogus number of reserved sectors
[  270.536263] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:46 executing program 4:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:46 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:46 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:46 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{0x0}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:46 executing program 4:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  270.723536] FAT-fs (loop5): bogus number of reserved sectors
[  270.730646] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:47 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:47 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:47 executing program 2:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:47 executing program 4:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 4:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  271.401386] FAT-fs (loop5): bogus number of reserved sectors
[  271.407290] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:47 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:47 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:47 executing program 2:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:47 executing program 2:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  271.546482] FAT-fs (loop5): bogus number of reserved sectors
[  271.583842] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:47 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 4:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:47 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:47 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:47 executing program 4:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 2:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:47 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  271.766550] FAT-fs (loop5): bogus number of reserved sectors
05:47:47 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  271.818546] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:48 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 2:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:48 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 2:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  272.087986] FAT-fs (loop5): bogus number of reserved sectors
[  272.109434] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:48 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:48 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 0:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:48 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  272.273576] FAT-fs (loop5): bogus number of reserved sectors
[  272.301669] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:48 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 0:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  272.441619] FAT-fs (loop5): bogus number of reserved sectors
[  272.466085] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:48 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:48 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 0:
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  272.686983] FAT-fs (loop5): invalid media value (0x00)
05:47:48 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:48 executing program 0:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  272.730698] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:48 executing program 0:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:48 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:49 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 0:
mkdir(0x0, 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  272.967384] FAT-fs (loop5): invalid media value (0x00)
05:47:49 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

[  273.020899] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:49 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  273.162876] FAT-fs (loop5): invalid media value (0x00)
[  273.171721] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:49 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:49 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  273.386727] FAT-fs (loop5): invalid media value (0x00)
[  273.414153] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:49 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:49 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  273.595831] FAT-fs (loop5): invalid media value (0x00)
[  273.613176] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:49 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:49 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:49 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:49 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  273.798415] FAT-fs (loop5): invalid media value (0x00)
05:47:50 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:50 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:50 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:50 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  273.839496] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:50 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:50 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:50 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:50 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:50 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  274.021072] FAT-fs (loop5): invalid media value (0x00)
[  274.029043] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:50 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:50 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:50 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:50 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:50 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  274.209086] FAT-fs (loop5): invalid media value (0x00)
[  274.233575] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:50 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:50 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:50 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:50 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:50 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:50 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:50 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:51 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:51 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

[  274.798471] FAT-fs (loop5): invalid media value (0x00)
[  274.814011] FAT-fs (loop5): Can't find a valid FAT filesystem
05:47:51 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:51 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:51 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:51 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:51 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:51 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:51 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:51 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:51 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:51 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:51 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:51 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:51 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:51 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:51 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:52 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:52 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:52 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:52 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:52 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:52 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:52 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:52 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:52 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:52 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:52 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:52 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:53 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:53 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:53 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="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", 0x2e6)

05:47:53 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:53 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)

05:47:53 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:53 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="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", 0x2e6)

05:47:53 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:53 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:53 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:53 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:53 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:54 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:54 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:54 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:54 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)

05:47:54 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:54 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:54 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:54 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:54 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(0x0, 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:54 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(0x0, 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:54 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(0x0, 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:54 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:55 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

05:47:55 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="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", 0x2e6)

05:47:55 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)

05:47:55 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:55 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:55 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:55 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:55 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(0x0, 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:55 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(0x0, 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:55 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(0x0, 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:55 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:55 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:56 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

05:47:56 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x2e6)

05:47:56 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:56 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:56 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(0xffffffffffffffff, &(0x7f0000001400)="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", 0x2e6)

05:47:56 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:56 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:56 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:56 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:56 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(0xffffffffffffffff, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347", 0x2e6)

05:47:56 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(0xffffffffffffffff, &(0x7f0000001400)="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", 0x2e6)

05:47:56 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:56 executing program 3:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

05:47:56 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:56 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, 0x0, 0x0)

05:47:56 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)

05:47:56 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, 0x0, 0x0)

05:47:57 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:57 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:57 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:57 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, 0x0, 0x0)

05:47:57 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:57 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:57 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

05:47:57 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)

05:47:57 executing program 1:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001"], 0x0)

05:47:57 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

05:47:57 executing program 3:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001"], 0x0)

05:47:57 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

05:47:57 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

05:47:57 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:57 executing program 1:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:58 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x173)

05:47:58 executing program 3:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:58 executing program 1:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

[  281.966974] ISOFS: unable to read i-node block
05:47:58 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="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", 0x173)

05:47:58 executing program 0:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)

05:47:58 executing program 3:
syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f00000000000000000000000000000000000000000000000000000000000000000100000101000001", 0x80, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0000000000000001bd1c"], 0x0)

05:47:58 executing program 1 (fault-call:4 fault-nth:0):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:58 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

05:47:58 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

05:47:58 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

[  282.559753] ISOFS: Logical zone size(0) < hardware blocksize(1024)
[  282.576264] FAULT_INJECTION: forcing a failure.
[  282.576264] name failslab, interval 1, probability 0, space 0, times 1
[  282.603494] CPU: 1 PID: 11911 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0
[  282.611403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  282.620754] Call Trace:
[  282.623412]  dump_stack+0x13e/0x194
[  282.627072]  should_fail.cold+0x10a/0x14b
[  282.631268]  should_failslab+0xd6/0x130
[  282.635240]  kmem_cache_alloc+0x2b5/0x770
[  282.639447]  getname_flags+0xc8/0x560
[  282.643260]  user_path_mountpoint_at+0x23/0x40
[  282.647880]  SyS_umount+0x10a/0x340
[  282.651498]  ? SyS_write+0x14d/0x210
[  282.655205]  ? __detach_mounts+0x2e0/0x2e0
05:47:58 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

[  282.659485]  ? SyS_clock_settime+0x1a0/0x1a0
[  282.663900]  ? do_syscall_64+0x4c/0x640
[  282.667877]  ? __detach_mounts+0x2e0/0x2e0
[  282.672115]  do_syscall_64+0x1d5/0x640
[  282.676064]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  282.681266] RIP: 0033:0x45c479
[  282.684469] RSP: 002b:00007f559fabcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[  282.692177] RAX: ffffffffffffffda RBX: 00007f559fabd6d4 RCX: 000000000045c479
[  282.699454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040
[  282.706720] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  282.713979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  282.721245] R13: 0000000000000c3a R14: 00000000004ce21f R15: 0000000000000000
05:47:58 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

05:47:59 executing program 3 (fault-call:3 fault-nth:0):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:47:59 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4", 0xba)

[  282.944497] FAULT_INJECTION: forcing a failure.
[  282.944497] name failslab, interval 1, probability 0, space 0, times 0
[  282.963796] CPU: 0 PID: 11935 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  282.971720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  282.981080] Call Trace:
[  282.983676]  dump_stack+0x13e/0x194
[  282.987315]  should_fail.cold+0x10a/0x14b
[  282.991469]  should_failslab+0xd6/0x130
[  282.995508]  __kmalloc_track_caller+0x2e1/0x7b0
[  283.000234]  ? strndup_user+0x5b/0xf0
[  283.004083]  ? wait_for_completion+0x390/0x390
[  283.008659]  ? vfs_write+0xff/0x4e0
[  283.012280]  memdup_user+0x22/0xa0
[  283.015806]  strndup_user+0x5b/0xf0
[  283.019414]  ? copy_mnt_ns+0x8a0/0x8a0
[  283.023284]  SyS_mount+0x39/0x120
[  283.026719]  ? copy_mnt_ns+0x8a0/0x8a0
[  283.030602]  do_syscall_64+0x1d5/0x640
[  283.034485]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  283.039663] RIP: 0033:0x45c479
[  283.042835] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  283.050635] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  283.057900] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  283.065164] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  283.072418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  283.079673] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000000
05:47:59 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

05:47:59 executing program 1 (fault-call:4 fault-nth:1):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:47:59 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

05:47:59 executing program 0 (fault-call:3 fault-nth:0):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  283.412928] FAULT_INJECTION: forcing a failure.
[  283.412928] name failslab, interval 1, probability 0, space 0, times 0
[  283.424308] CPU: 0 PID: 11955 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  283.432194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  283.441553] Call Trace:
[  283.444149]  dump_stack+0x13e/0x194
[  283.447785]  should_fail.cold+0x10a/0x14b
[  283.451944]  should_failslab+0xd6/0x130
[  283.455930]  __kmalloc_track_caller+0x2e1/0x7b0
[  283.460603]  ? strndup_user+0x5b/0xf0
[  283.464406]  ? wait_for_completion+0x390/0x390
[  283.468990]  ? vfs_write+0xff/0x4e0
[  283.472623]  memdup_user+0x22/0xa0
[  283.476164]  strndup_user+0x5b/0xf0
[  283.479786]  ? copy_mnt_ns+0x8a0/0x8a0
[  283.483666]  SyS_mount+0x39/0x120
[  283.487113]  ? copy_mnt_ns+0x8a0/0x8a0
[  283.490988]  do_syscall_64+0x1d5/0x640
[  283.494863]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  283.500039] RIP: 0033:0x45c479
[  283.503221] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
05:47:59 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

[  283.510915] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  283.518167] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  283.525417] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  283.532666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  283.539916] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000000
05:47:59 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

[  283.559277] FAULT_INJECTION: forcing a failure.
[  283.559277] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[  283.571260] CPU: 1 PID: 11959 Comm: syz-executor.1 Not tainted 4.14.172-syzkaller #0
[  283.579124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  283.588463] Call Trace:
[  283.591053]  dump_stack+0x13e/0x194
[  283.594685]  should_fail.cold+0x10a/0x14b
[  283.598880]  __alloc_pages_nodemask+0x1bf/0x700
[  283.603584]  ? __alloc_pages_slowpath+0x26c0/0x26c0
[  283.608599]  ? find_held_lock+0x2d/0x110
05:47:59 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

[  283.612655]  cache_grow_begin+0x7b/0x410
[  283.616724]  kmem_cache_alloc+0x695/0x770
[  283.620885]  getname_flags+0xc8/0x560
[  283.624690]  user_path_mountpoint_at+0x23/0x40
[  283.629275]  SyS_umount+0x10a/0x340
[  283.632885]  ? SyS_write+0x14d/0x210
[  283.636584]  ? __detach_mounts+0x2e0/0x2e0
[  283.640799]  ? SyS_clock_settime+0x1a0/0x1a0
[  283.645189]  ? do_syscall_64+0x4c/0x640
[  283.649152]  ? __detach_mounts+0x2e0/0x2e0
[  283.653508]  do_syscall_64+0x1d5/0x640
[  283.657398]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
05:47:59 executing program 3 (fault-call:3 fault-nth:1):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  283.662570] RIP: 0033:0x45c479
[  283.665746] RSP: 002b:00007f559fabcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[  283.673457] RAX: ffffffffffffffda RBX: 00007f559fabd6d4 RCX: 000000000045c479
[  283.680719] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040
[  283.687976] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  283.695239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  283.702490] R13: 0000000000000c3a R14: 00000000004ce21f R15: 0000000000000001
05:47:59 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

[  283.867482] FAULT_INJECTION: forcing a failure.
[  283.867482] name failslab, interval 1, probability 0, space 0, times 0
[  283.878887] CPU: 0 PID: 11975 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  283.886771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  283.896114] Call Trace:
[  283.898692]  dump_stack+0x13e/0x194
[  283.902313]  should_fail.cold+0x10a/0x14b
[  283.906446]  should_failslab+0xd6/0x130
[  283.910404]  kmem_cache_alloc+0x2b5/0x770
[  283.914534]  ? save_trace+0x290/0x290
[  283.918323]  getname_flags+0xc8/0x560
[  283.922104]  ? find_held_lock+0x2d/0x110
[  283.926147]  user_path_at_empty+0x2a/0x50
[  283.930281]  do_mount+0x10b/0x24f0
[  283.933805]  ? copy_mount_string+0x40/0x40
[  283.938132]  ? __might_fault+0x177/0x1b0
[  283.942210]  ? _copy_from_user+0x94/0x100
[  283.946342]  ? memdup_user+0x54/0xa0
[  283.950039]  ? copy_mount_options+0x1ec/0x2e0
[  283.954535]  ? copy_mnt_ns+0x8a0/0x8a0
[  283.958417]  SyS_mount+0xa8/0x120
[  283.961860]  ? copy_mnt_ns+0x8a0/0x8a0
[  283.965750]  do_syscall_64+0x1d5/0x640
[  283.969631]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  283.974806] RIP: 0033:0x45c479
[  283.977979] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  283.985675] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  283.992931] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  284.000186] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  284.007439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  284.014704] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000001
05:48:00 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400), 0x0)

05:48:00 executing program 0 (fault-call:3 fault-nth:1):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:00 executing program 1 (fault-call:4 fault-nth:2):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:48:00 executing program 5 (fault-call:7 fault-nth:0):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  284.318141] FAULT_INJECTION: forcing a failure.
[  284.318141] name failslab, interval 1, probability 0, space 0, times 0
[  284.337674] FAULT_INJECTION: forcing a failure.
[  284.337674] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  284.337839] CPU: 1 PID: 11997 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  284.357555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  284.366986] Call Trace:
[  284.369568]  dump_stack+0x13e/0x194
[  284.373205]  should_fail.cold+0x10a/0x14b
[  284.377352]  should_failslab+0xd6/0x130
[  284.381307]  kmem_cache_alloc+0x2b5/0x770
[  284.385441]  ? save_trace+0x290/0x290
[  284.389229]  getname_flags+0xc8/0x560
[  284.393014]  ? find_held_lock+0x2d/0x110
[  284.397084]  user_path_at_empty+0x2a/0x50
[  284.401225]  do_mount+0x10b/0x24f0
[  284.404751]  ? copy_mount_string+0x40/0x40
[  284.408973]  ? __might_fault+0x177/0x1b0
[  284.413019]  ? _copy_from_user+0x94/0x100
[  284.417165]  ? memdup_user+0x54/0xa0
[  284.420867]  ? copy_mount_options+0x1ec/0x2e0
[  284.425350]  ? copy_mnt_ns+0x8a0/0x8a0
[  284.429222]  SyS_mount+0xa8/0x120
[  284.432665]  ? copy_mnt_ns+0x8a0/0x8a0
[  284.436543]  do_syscall_64+0x1d5/0x640
[  284.440421]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  284.445596] RIP: 0033:0x45c479
[  284.448797] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  284.456501] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  284.463764] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  284.471030] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  284.478289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  284.485553] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000001
[  284.492844] CPU: 0 PID: 11994 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  284.500743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  284.510107] Call Trace:
[  284.512728]  dump_stack+0x13e/0x194
[  284.516371]  should_fail.cold+0x10a/0x14b
[  284.520531]  __alloc_pages_nodemask+0x1bf/0x700
[  284.525210]  ? __alloc_pages_slowpath+0x26c0/0x26c0
[  284.530288]  ? find_get_entry+0x21d/0x690
[  284.534442]  ? lock_downgrade+0x6e0/0x6e0
[  284.538575]  alloc_pages_current+0xe7/0x1e0
[  284.542891]  __page_cache_alloc+0x245/0x3d0
[  284.547204]  pagecache_get_page+0x174/0xa10
[  284.551557]  ? fat_add_cluster+0xc0/0xc0
[  284.555601]  grab_cache_page_write_begin+0x6c/0xa0
[  284.560556]  block_write_begin+0x33/0x260
[  284.564692]  cont_write_begin+0x3f0/0x710
[  284.568824]  ? pagecache_isize_extended+0x320/0x320
[  284.573823]  ? block_write_begin+0x260/0x260
[  284.578223]  ? current_time+0x16/0xb0
[  284.582024]  ? iov_iter_fault_in_readable+0x1be/0x390
[  284.587204]  fat_write_begin+0x89/0x110
[  284.591165]  ? fat_add_cluster+0xc0/0xc0
[  284.595223]  generic_perform_write+0x1c9/0x420
[  284.599795]  ? page_endio+0x520/0x520
[  284.603579]  ? generic_file_direct_write+0x2fa/0x420
[  284.608667]  __generic_file_write_iter+0x429/0x590
[  284.613581]  generic_file_write_iter+0x2fa/0x650
[  284.618322]  __vfs_write+0x44e/0x630
[  284.622077]  ? kernel_read+0x110/0x110
[  284.626013]  ? rcu_read_lock_sched_held+0x10a/0x130
[  284.631135]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  284.635886]  vfs_write+0x192/0x4e0
[  284.639416]  SyS_write+0xf2/0x210
[  284.642861]  ? SyS_read+0x210/0x210
[  284.646471]  ? SyS_clock_settime+0x1a0/0x1a0
[  284.650874]  ? do_syscall_64+0x4c/0x640
[  284.654858]  ? SyS_read+0x210/0x210
[  284.658474]  do_syscall_64+0x1d5/0x640
[  284.662352]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
05:48:00 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(0x0, 0x0)

05:48:00 executing program 3 (fault-call:3 fault-nth:2):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  284.667529] RIP: 0033:0x45c479
[  284.670703] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  284.678420] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  284.685687] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  284.692958] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  284.700213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  284.707465] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000000
05:48:00 executing program 4 (fault-call:4 fault-nth:0):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:48:00 executing program 5 (fault-call:7 fault-nth:1):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  284.867369] FAULT_INJECTION: forcing a failure.
[  284.867369] name failslab, interval 1, probability 0, space 0, times 0
[  284.868322] FAULT_INJECTION: forcing a failure.
[  284.868322] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  284.879421] CPU: 0 PID: 12012 Comm: syz-executor.4 Not tainted 4.14.172-syzkaller #0
[  284.898280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  284.907622] Call Trace:
[  284.910206]  dump_stack+0x13e/0x194
[  284.913824]  should_fail.cold+0x10a/0x14b
[  284.917960]  should_failslab+0xd6/0x130
[  284.921920]  kmem_cache_alloc+0x2b5/0x770
[  284.926057]  getname_flags+0xc8/0x560
[  284.929858]  user_path_mountpoint_at+0x23/0x40
[  284.934424]  SyS_umount+0x10a/0x340
[  284.938036]  ? SyS_write+0x14d/0x210
[  284.941733]  ? __detach_mounts+0x2e0/0x2e0
[  284.945956]  ? SyS_clock_settime+0x1a0/0x1a0
[  284.950346]  ? do_syscall_64+0x4c/0x640
[  284.954300]  ? __detach_mounts+0x2e0/0x2e0
[  284.958518]  do_syscall_64+0x1d5/0x640
[  284.962397]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  284.967570] RIP: 0033:0x45c479
[  284.970754] RSP: 002b:00007f0849470c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[  284.978457] RAX: ffffffffffffffda RBX: 00007f08494716d4 RCX: 000000000045c479
[  284.985721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040
[  284.992979] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  285.000230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  285.007479] R13: 0000000000000c3a R14: 00000000004ce21f R15: 0000000000000000
[  285.014751] CPU: 1 PID: 12009 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  285.022649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  285.032011] Call Trace:
[  285.034610]  dump_stack+0x13e/0x194
[  285.038264]  should_fail.cold+0x10a/0x14b
[  285.042422]  __alloc_pages_nodemask+0x1bf/0x700
[  285.042800] FAULT_INJECTION: forcing a failure.
[  285.042800] name failslab, interval 1, probability 0, space 0, times 0
[  285.047097]  ? __alloc_pages_slowpath+0x26c0/0x26c0
[  285.047108]  ? find_held_lock+0x2d/0x110
[  285.047130]  cache_grow_begin+0x7b/0x410
[  285.047141]  kmem_cache_alloc+0x695/0x770
[  285.047157]  getname_flags+0xc8/0x560
[  285.047164]  ? find_held_lock+0x2d/0x110
[  285.047179]  user_path_at_empty+0x2a/0x50
[  285.087545]  do_mount+0x10b/0x24f0
[  285.091073]  ? copy_mount_string+0x40/0x40
[  285.095290]  ? __might_fault+0x177/0x1b0
[  285.099335]  ? _copy_from_user+0x94/0x100
[  285.103470]  ? memdup_user+0x54/0xa0
[  285.107166]  ? copy_mount_options+0x1ec/0x2e0
[  285.111640]  ? copy_mnt_ns+0x8a0/0x8a0
[  285.115509]  SyS_mount+0xa8/0x120
[  285.118944]  ? copy_mnt_ns+0x8a0/0x8a0
[  285.122827]  do_syscall_64+0x1d5/0x640
[  285.126704]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  285.131872] RIP: 0033:0x45c479
[  285.135042] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  285.142734] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  285.149985] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  285.157238] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
05:48:01 executing program 0 (fault-call:3 fault-nth:2):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:01 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x1, @null, @netrom={'nr', 0x0}, 0x8001, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1f, 0x6, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]})

[  285.164490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  285.171751] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000002
[  285.233120] CPU: 0 PID: 12014 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  285.241051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  285.250407] Call Trace:
[  285.253008]  dump_stack+0x13e/0x194
[  285.256649]  should_fail.cold+0x10a/0x14b
[  285.260803]  should_failslab+0xd6/0x130
[  285.264782]  kmem_cache_alloc+0x2b5/0x770
[  285.268991]  ? check_preemption_disabled+0x35/0x240
[  285.274018]  ? save_trace+0x290/0x290
[  285.277822]  alloc_buffer_head+0x20/0xd0
[  285.281881]  alloc_page_buffers+0xb3/0x1f0
[  285.286116]  ? fat_add_cluster+0xc0/0xc0
[  285.290166]  create_empty_buffers+0x36/0x470
[  285.294580]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  285.300038]  ? fat_add_cluster+0xc0/0xc0
[  285.302729] FAULT_INJECTION: forcing a failure.
[  285.302729] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  285.304100]  create_page_buffers+0x14d/0x1c0
[  285.320297]  __block_write_begin_int+0x167/0x1030
[  285.325134]  ? fat_add_cluster+0xc0/0xc0
[  285.329178]  ? add_to_page_cache_lru+0x150/0x300
[  285.333915]  ? add_to_page_cache_locked+0x40/0x40
[  285.338742]  ? __page_cache_alloc+0xd9/0x3d0
[  285.343146]  ? __breadahead+0xd0/0xd0
[  285.346927]  ? pagecache_get_page+0x12c/0xa10
[  285.351405]  ? wait_for_stable_page+0xe3/0x270
[  285.355972]  ? fat_add_cluster+0xc0/0xc0
[  285.360014]  block_write_begin+0x58/0x260
[  285.364145]  cont_write_begin+0x3f0/0x710
[  285.368280]  ? pagecache_isize_extended+0x320/0x320
[  285.373279]  ? block_write_begin+0x260/0x260
[  285.377668]  ? current_time+0x16/0xb0
[  285.381453]  ? iov_iter_fault_in_readable+0x1be/0x390
[  285.386624]  fat_write_begin+0x89/0x110
[  285.390578]  ? fat_add_cluster+0xc0/0xc0
[  285.394622]  generic_perform_write+0x1c9/0x420
[  285.399192]  ? page_endio+0x520/0x520
[  285.402978]  ? generic_file_direct_write+0x2fa/0x420
[  285.408067]  __generic_file_write_iter+0x429/0x590
[  285.412982]  generic_file_write_iter+0x2fa/0x650
[  285.417733]  __vfs_write+0x44e/0x630
[  285.421439]  ? kernel_read+0x110/0x110
[  285.425428]  ? rcu_read_lock_sched_held+0x10a/0x130
[  285.430445]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  285.435186]  vfs_write+0x192/0x4e0
[  285.438708]  SyS_write+0xf2/0x210
[  285.442145]  ? SyS_read+0x210/0x210
[  285.445767]  ? SyS_clock_settime+0x1a0/0x1a0
[  285.450233]  ? do_syscall_64+0x4c/0x640
[  285.454191]  ? SyS_read+0x210/0x210
[  285.457804]  do_syscall_64+0x1d5/0x640
[  285.461680]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  285.466861] RIP: 0033:0x45c479
[  285.470032] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  285.477721] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  285.484973] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  285.492232] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  285.499486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  285.506736] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000001
[  285.514015] CPU: 1 PID: 12023 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  285.521905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  285.531255] Call Trace:
[  285.533849]  dump_stack+0x13e/0x194
[  285.537479]  should_fail.cold+0x10a/0x14b
[  285.541620]  __alloc_pages_nodemask+0x1bf/0x700
[  285.546291]  ? __alloc_pages_slowpath+0x26c0/0x26c0
[  285.551307]  ? find_held_lock+0x2d/0x110
[  285.555361]  cache_grow_begin+0x7b/0x410
[  285.559409]  kmem_cache_alloc+0x695/0x770
[  285.563545]  getname_flags+0xc8/0x560
[  285.567330]  ? find_held_lock+0x2d/0x110
[  285.571378]  user_path_at_empty+0x2a/0x50
[  285.575530]  do_mount+0x10b/0x24f0
[  285.579065]  ? copy_mount_string+0x40/0x40
[  285.583287]  ? __might_fault+0x177/0x1b0
[  285.587339]  ? _copy_from_user+0x94/0x100
[  285.591479]  ? memdup_user+0x54/0xa0
[  285.595188]  ? copy_mount_options+0x1ec/0x2e0
[  285.599678]  ? copy_mnt_ns+0x8a0/0x8a0
[  285.603560]  SyS_mount+0xa8/0x120
[  285.607005]  ? copy_mnt_ns+0x8a0/0x8a0
[  285.610879]  do_syscall_64+0x1d5/0x640
[  285.614763]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  285.619934] RIP: 0033:0x45c479
[  285.623105] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
05:48:01 executing program 4 (fault-call:4 fault-nth:1):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:48:01 executing program 3 (fault-call:3 fault-nth:3):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:01 executing program 2 (fault-call:4 fault-nth:0):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:48:01 executing program 5 (fault-call:7 fault-nth:2):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  285.630795] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  285.638062] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  285.645316] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  285.652576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  285.659828] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000002
[  285.790354] FAULT_INJECTION: forcing a failure.
[  285.790354] name failslab, interval 1, probability 0, space 0, times 0
[  285.804629] CPU: 0 PID: 12036 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  285.807991] FAULT_INJECTION: forcing a failure.
[  285.807991] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  285.812531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  285.833651] Call Trace:
[  285.836242]  dump_stack+0x13e/0x194
[  285.839873]  should_fail.cold+0x10a/0x14b
[  285.844066]  should_failslab+0xd6/0x130
[  285.848031]  kmem_cache_alloc+0x2b5/0x770
[  285.852163]  ? recalc_bh_state+0x1f/0x170
[  285.856295]  ? check_preemption_disabled+0x35/0x240
[  285.861305]  alloc_buffer_head+0x20/0xd0
[  285.865368]  alloc_page_buffers+0xb3/0x1f0
[  285.869597]  ? fat_add_cluster+0xc0/0xc0
[  285.873645]  create_empty_buffers+0x36/0x470
[  285.878038]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  285.883470]  ? fat_add_cluster+0xc0/0xc0
[  285.887512]  create_page_buffers+0x14d/0x1c0
[  285.891904]  __block_write_begin_int+0x167/0x1030
[  285.896732]  ? fat_add_cluster+0xc0/0xc0
[  285.900782]  ? add_to_page_cache_lru+0x150/0x300
[  285.905517]  ? add_to_page_cache_locked+0x40/0x40
[  285.910337]  ? __page_cache_alloc+0xd9/0x3d0
[  285.914735]  ? __breadahead+0xd0/0xd0
[  285.918536]  ? pagecache_get_page+0x12c/0xa10
[  285.923030]  ? wait_for_stable_page+0xe3/0x270
[  285.927614]  ? fat_add_cluster+0xc0/0xc0
[  285.931673]  block_write_begin+0x58/0x260
[  285.935826]  cont_write_begin+0x3f0/0x710
[  285.939967]  ? pagecache_isize_extended+0x320/0x320
[  285.944969]  ? block_write_begin+0x260/0x260
[  285.949363]  ? current_time+0x16/0xb0
[  285.953166]  ? iov_iter_fault_in_readable+0x1be/0x390
[  285.958349]  fat_write_begin+0x89/0x110
[  285.962315]  ? fat_add_cluster+0xc0/0xc0
[  285.966365]  generic_perform_write+0x1c9/0x420
[  285.970936]  ? page_endio+0x520/0x520
[  285.974728]  ? generic_file_direct_write+0x2fa/0x420
[  285.979837]  __generic_file_write_iter+0x429/0x590
[  285.984757]  generic_file_write_iter+0x2fa/0x650
[  285.989508]  __vfs_write+0x44e/0x630
[  285.993210]  ? kernel_read+0x110/0x110
[  285.997103]  ? rcu_read_lock_sched_held+0x10a/0x130
[  286.002107]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  286.006850]  vfs_write+0x192/0x4e0
[  286.010384]  SyS_write+0xf2/0x210
[  286.013820]  ? SyS_read+0x210/0x210
[  286.017443]  ? SyS_clock_settime+0x1a0/0x1a0
[  286.021838]  ? do_syscall_64+0x4c/0x640
[  286.025792]  ? SyS_read+0x210/0x210
[  286.029412]  do_syscall_64+0x1d5/0x640
[  286.033296]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.038593] RIP: 0033:0x45c479
[  286.041772] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  286.049473] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  286.056732] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  286.063985] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  286.071238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  286.078490] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000002
[  286.085769] CPU: 1 PID: 12038 Comm: syz-executor.4 Not tainted 4.14.172-syzkaller #0
[  286.093650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  286.102986] Call Trace:
[  286.105557]  dump_stack+0x13e/0x194
[  286.109188]  should_fail.cold+0x10a/0x14b
[  286.113339]  __alloc_pages_nodemask+0x1bf/0x700
[  286.117999]  ? __alloc_pages_slowpath+0x26c0/0x26c0
[  286.122999]  ? find_held_lock+0x2d/0x110
[  286.127049]  cache_grow_begin+0x7b/0x410
[  286.131098]  kmem_cache_alloc+0x695/0x770
[  286.135238]  getname_flags+0xc8/0x560
[  286.139024]  user_path_mountpoint_at+0x23/0x40
[  286.143590]  SyS_umount+0x10a/0x340
[  286.147198]  ? SyS_write+0x14d/0x210
[  286.150894]  ? __detach_mounts+0x2e0/0x2e0
[  286.155108]  ? SyS_clock_settime+0x1a0/0x1a0
[  286.159497]  ? do_syscall_64+0x4c/0x640
[  286.163449]  ? __detach_mounts+0x2e0/0x2e0
[  286.167670]  do_syscall_64+0x1d5/0x640
[  286.171542]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.176713] RIP: 0033:0x45c479
[  286.179886] RSP: 002b:00007f0849470c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
05:48:02 executing program 0 (fault-call:3 fault-nth:3):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:02 executing program 5 (fault-call:7 fault-nth:3):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  286.187576] RAX: ffffffffffffffda RBX: 00007f08494716d4 RCX: 000000000045c479
[  286.194826] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040
[  286.202089] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  286.209340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  286.216591] R13: 0000000000000c3a R14: 00000000004ce21f R15: 0000000000000001
[  286.268940] FAULT_INJECTION: forcing a failure.
[  286.268940] name failslab, interval 1, probability 0, space 0, times 0
[  286.281809] FAULT_INJECTION: forcing a failure.
[  286.281809] name failslab, interval 1, probability 0, space 0, times 0
[  286.289944] CPU: 0 PID: 12040 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  286.300928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  286.310308] Call Trace:
[  286.312901]  dump_stack+0x13e/0x194
[  286.316520]  should_fail.cold+0x10a/0x14b
[  286.320754]  ? rpc_pipe_release+0x800/0x800
[  286.325066]  should_failslab+0xd6/0x130
[  286.329035]  kmem_cache_alloc_trace+0x2db/0x7b0
[  286.333747]  ? lock_downgrade+0x6e0/0x6e0
[  286.337883]  ? rpc_pipe_release+0x800/0x800
[  286.342189]  sget_userns+0x102/0xc30
[  286.345902]  ? get_empty_filp.cold+0x47/0x47
[  286.350306]  ? set_anon_super+0x20/0x20
[  286.354280]  ? rpc_pipe_release+0x800/0x800
[  286.358596]  mount_ns+0x65/0x180
[  286.361951]  mount_fs+0x92/0x2a0
[  286.365307]  vfs_kern_mount.part.0+0x5b/0x3c0
[  286.369788]  do_mount+0x3c9/0x24f0
[  286.373313]  ? copy_mount_string+0x40/0x40
[  286.377534]  ? __might_fault+0x177/0x1b0
[  286.381579]  ? _copy_from_user+0x94/0x100
[  286.385713]  ? memdup_user+0x54/0xa0
[  286.389412]  ? copy_mount_options+0x1ec/0x2e0
[  286.393892]  ? copy_mnt_ns+0x8a0/0x8a0
[  286.397764]  SyS_mount+0xa8/0x120
[  286.401215]  ? copy_mnt_ns+0x8a0/0x8a0
[  286.405106]  do_syscall_64+0x1d5/0x640
[  286.409002]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.414186] RIP: 0033:0x45c479
[  286.417387] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  286.425174] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  286.432433] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  286.439687] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  286.446964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  286.454216] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000003
[  286.462185] CPU: 1 PID: 12041 Comm: syz-executor.2 Not tainted 4.14.172-syzkaller #0
[  286.470086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  286.479436] Call Trace:
[  286.482031]  dump_stack+0x13e/0x194
[  286.485700]  should_fail.cold+0x10a/0x14b
[  286.489855]  should_failslab+0xd6/0x130
[  286.493838]  kmem_cache_alloc+0x2b5/0x770
[  286.497996]  getname_flags+0xc8/0x560
[  286.501793]  user_path_mountpoint_at+0x23/0x40
[  286.506356]  SyS_umount+0x10a/0x340
[  286.509960]  ? SyS_write+0x14d/0x210
[  286.513651]  ? __detach_mounts+0x2e0/0x2e0
[  286.517868]  ? SyS_clock_settime+0x1a0/0x1a0
[  286.522262]  ? do_syscall_64+0x4c/0x640
[  286.526216]  ? __detach_mounts+0x2e0/0x2e0
[  286.529770] FAULT_INJECTION: forcing a failure.
[  286.529770] name failslab, interval 1, probability 0, space 0, times 0
[  286.530439]  do_syscall_64+0x1d5/0x640
[  286.530455]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.530466] RIP: 0033:0x45c479
[  286.530470] RSP: 002b:00007f7957cf8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[  286.530479] RAX: ffffffffffffffda RBX: 00007f7957cf96d4 RCX: 000000000045c479
[  286.530490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040
[  286.576152] RBP: 000000000076c060 R08: 0000000000000000 R09: 0000000000000000
[  286.583438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  286.590699] R13: 0000000000000c3a R14: 00000000004ce21f R15: 0000000000000000
[  286.597968] CPU: 0 PID: 12049 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  286.605856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  286.615404] Call Trace:
[  286.617986]  dump_stack+0x13e/0x194
[  286.621601]  should_fail.cold+0x10a/0x14b
[  286.625734]  should_failslab+0xd6/0x130
[  286.629691]  kmem_cache_alloc+0x2b5/0x770
[  286.633837]  ? lock_acquire+0x170/0x3f0
[  286.637797]  ? lock_downgrade+0x6e0/0x6e0
[  286.641931]  alloc_vfsmnt+0x23/0x7c0
[  286.645631]  vfs_kern_mount.part.0+0x27/0x3c0
[  286.650108]  do_mount+0x3c9/0x24f0
[  286.653632]  ? copy_mount_string+0x40/0x40
[  286.657847]  ? __might_fault+0x177/0x1b0
[  286.661890]  ? _copy_from_user+0x94/0x100
[  286.666022]  ? memdup_user+0x54/0xa0
[  286.669716]  ? copy_mount_options+0x1ec/0x2e0
[  286.674191]  ? copy_mnt_ns+0x8a0/0x8a0
[  286.678062]  SyS_mount+0xa8/0x120
[  286.681493]  ? copy_mnt_ns+0x8a0/0x8a0
[  286.685362]  do_syscall_64+0x1d5/0x640
[  286.689242]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  286.694412] RIP: 0033:0x45c479
[  286.697599] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  286.705287] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  286.712547] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
05:48:02 executing program 4:
perf_event_open(&(0x7f0000000100)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$can_raw(0x1d, 0x3, 0x1)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00')
sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="004829bd7000000200d4ea28ade17ce98f8000c9f03712c1e58b80060002005d000000d490580500ffffffff0000050015000f00c70000060011000800000006001600370000000400bf00040008efec42add5e7de728234293625c24eba2132a97ac8ea4cfc49eccfcde5b7653a216e4100000000000000"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x8000)

05:48:02 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000100)={0x6, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  286.719797] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  286.727047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  286.734298] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000003
05:48:02 executing program 3 (fault-call:3 fault-nth:4):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:02 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x80000)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x3}, 0x8000000200100000, 0x800007f, 0xfffffffc}, 0x0, 0x0, r1, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
r2 = syz_open_dev$ttys(0xc, 0x2, 0x0)
ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100))

[  286.839224] FAULT_INJECTION: forcing a failure.
[  286.839224] name failslab, interval 1, probability 0, space 0, times 0
[  286.899423] CPU: 0 PID: 12053 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  286.907343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  286.916803] Call Trace:
[  286.919406]  dump_stack+0x13e/0x194
[  286.923041]  should_fail.cold+0x10a/0x14b
[  286.927187]  should_failslab+0xd6/0x130
[  286.931162]  kmem_cache_alloc+0x2b5/0x770
[  286.935314]  ? recalc_bh_state+0x1f/0x170
[  286.939444]  ? check_preemption_disabled+0x35/0x240
[  286.944447]  alloc_buffer_head+0x20/0xd0
[  286.948495]  alloc_page_buffers+0xb3/0x1f0
[  286.952716]  ? fat_add_cluster+0xc0/0xc0
[  286.956760]  create_empty_buffers+0x36/0x470
[  286.961149]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  286.966632]  ? fat_add_cluster+0xc0/0xc0
[  286.970708]  create_page_buffers+0x14d/0x1c0
[  286.975103]  __block_write_begin_int+0x167/0x1030
[  286.979935]  ? fat_add_cluster+0xc0/0xc0
[  286.983991]  ? add_to_page_cache_lru+0x150/0x300
[  286.988736]  ? add_to_page_cache_locked+0x40/0x40
[  286.993560]  ? __page_cache_alloc+0xd9/0x3d0
[  286.997954]  ? __breadahead+0xd0/0xd0
[  287.001749]  ? pagecache_get_page+0x12c/0xa10
[  287.006384]  ? wait_for_stable_page+0xe3/0x270
[  287.010957]  ? fat_add_cluster+0xc0/0xc0
[  287.015014]  block_write_begin+0x58/0x260
[  287.019149]  cont_write_begin+0x3f0/0x710
[  287.023286]  ? pagecache_isize_extended+0x320/0x320
[  287.028284]  ? block_write_begin+0x260/0x260
[  287.032680]  ? current_time+0x16/0xb0
[  287.036476]  ? iov_iter_fault_in_readable+0x1be/0x390
[  287.041668]  fat_write_begin+0x89/0x110
[  287.045673]  ? fat_add_cluster+0xc0/0xc0
[  287.049725]  generic_perform_write+0x1c9/0x420
[  287.054294]  ? page_endio+0x520/0x520
[  287.058077]  ? generic_file_direct_write+0x2fa/0x420
[  287.063164]  __generic_file_write_iter+0x429/0x590
[  287.068084]  generic_file_write_iter+0x2fa/0x650
[  287.072827]  __vfs_write+0x44e/0x630
[  287.076527]  ? kernel_read+0x110/0x110
[  287.080408]  ? rcu_read_lock_sched_held+0x10a/0x130
[  287.085465]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  287.090213]  vfs_write+0x192/0x4e0
[  287.093777]  SyS_write+0xf2/0x210
[  287.097247]  ? SyS_read+0x210/0x210
[  287.100853]  ? SyS_clock_settime+0x1a0/0x1a0
[  287.105244]  ? do_syscall_64+0x4c/0x640
[  287.109195]  ? SyS_read+0x210/0x210
[  287.112805]  do_syscall_64+0x1d5/0x640
[  287.116680]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  287.121847] RIP: 0033:0x45c479
[  287.125018] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  287.132748] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  287.140000] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
05:48:03 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
socket$nl_crypto(0x10, 0x3, 0x15)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)

05:48:03 executing program 5 (fault-call:7 fault-nth:4):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  287.147256] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  287.154506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  287.161804] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000003
[  287.189483] FAULT_INJECTION: forcing a failure.
[  287.189483] name failslab, interval 1, probability 0, space 0, times 0
[  287.206202] CPU: 1 PID: 12069 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  287.214116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  287.223473] Call Trace:
[  287.226050]  dump_stack+0x13e/0x194
[  287.229666]  should_fail.cold+0x10a/0x14b
[  287.233802]  ? rpc_pipe_release+0x800/0x800
[  287.238108]  should_failslab+0xd6/0x130
[  287.242068]  kmem_cache_alloc_trace+0x2db/0x7b0
[  287.246721]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  287.252150]  ? sget_userns+0x102/0xc30
[  287.256018]  ? rcu_read_lock_sched_held+0x10a/0x130
[  287.261061]  ? kmem_cache_alloc_trace+0x63e/0x7b0
[  287.264303] audit: type=1400 audit(1583387283.344:101): avc:  denied  { create } for  pid=12071 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1
[  287.265896]  ? rpc_pipe_release+0x800/0x800
[  287.265970]  selinux_sb_alloc_security+0x41/0x210
[  287.266012]  security_sb_alloc+0x66/0xa0
[  287.303111]  sget_userns+0x194/0xc30
[  287.306812]  ? get_empty_filp.cold+0x47/0x47
[  287.311204]  ? set_anon_super+0x20/0x20
[  287.315167]  ? rpc_pipe_release+0x800/0x800
[  287.319490]  mount_ns+0x65/0x180
[  287.322843]  mount_fs+0x92/0x2a0
[  287.326201]  vfs_kern_mount.part.0+0x5b/0x3c0
[  287.330725]  do_mount+0x3c9/0x24f0
[  287.334260]  ? copy_mount_string+0x40/0x40
[  287.338488]  ? __might_fault+0x177/0x1b0
[  287.342580]  ? _copy_from_user+0x94/0x100
[  287.346724]  ? memdup_user+0x54/0xa0
[  287.350432]  ? copy_mount_options+0x1ec/0x2e0
[  287.354956]  ? copy_mnt_ns+0x8a0/0x8a0
[  287.358825]  SyS_mount+0xa8/0x120
[  287.362299]  ? copy_mnt_ns+0x8a0/0x8a0
[  287.366178]  do_syscall_64+0x1d5/0x640
[  287.370072]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  287.375248] RIP: 0033:0x45c479
[  287.378425] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  287.386119] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  287.393395] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
05:48:03 executing program 0 (fault-call:3 fault-nth:4):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:03 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0xa, [0x7ff, 0x20, 0x7, 0x0, 0x9, 0x8, 0x3ff, 0x6, 0xfff, 0x2f69]}, &(0x7f0000000100)=0x18)

[  287.400660] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  287.407920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  287.415170] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000004
[  287.522805] FAULT_INJECTION: forcing a failure.
[  287.522805] name failslab, interval 1, probability 0, space 0, times 0
[  287.536019] FAULT_INJECTION: forcing a failure.
[  287.536019] name failslab, interval 1, probability 0, space 0, times 0
[  287.537127] CPU: 0 PID: 12084 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  287.555115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  287.564477] Call Trace:
[  287.567062]  dump_stack+0x13e/0x194
[  287.570686]  should_fail.cold+0x10a/0x14b
[  287.574826]  should_failslab+0xd6/0x130
[  287.578782]  kmem_cache_alloc+0x2b5/0x770
[  287.582935]  ? recalc_bh_state+0x1f/0x170
[  287.587067]  ? check_preemption_disabled+0x35/0x240
[  287.592293]  alloc_buffer_head+0x20/0xd0
[  287.596342]  alloc_page_buffers+0xb3/0x1f0
[  287.600580]  ? fat_add_cluster+0xc0/0xc0
[  287.604628]  create_empty_buffers+0x36/0x470
[  287.609036]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  287.614472]  ? fat_add_cluster+0xc0/0xc0
[  287.618521]  create_page_buffers+0x14d/0x1c0
[  287.622934]  __block_write_begin_int+0x167/0x1030
[  287.627766]  ? fat_add_cluster+0xc0/0xc0
[  287.631812]  ? add_to_page_cache_lru+0x150/0x300
[  287.636552]  ? add_to_page_cache_locked+0x40/0x40
[  287.641397]  ? __page_cache_alloc+0xd9/0x3d0
[  287.645822]  ? __breadahead+0xd0/0xd0
[  287.649623]  ? pagecache_get_page+0x12c/0xa10
[  287.654104]  ? wait_for_stable_page+0xe3/0x270
[  287.658674]  ? fat_add_cluster+0xc0/0xc0
[  287.662723]  block_write_begin+0x58/0x260
[  287.666870]  cont_write_begin+0x3f0/0x710
[  287.671011]  ? pagecache_isize_extended+0x320/0x320
[  287.676026]  ? block_write_begin+0x260/0x260
[  287.680443]  ? current_time+0x16/0xb0
[  287.684244]  ? iov_iter_fault_in_readable+0x1be/0x390
[  287.689426]  fat_write_begin+0x89/0x110
[  287.693400]  ? fat_add_cluster+0xc0/0xc0
[  287.697453]  generic_perform_write+0x1c9/0x420
[  287.702027]  ? page_endio+0x520/0x520
[  287.705814]  ? generic_file_direct_write+0x2fa/0x420
[  287.710903]  __generic_file_write_iter+0x429/0x590
[  287.715821]  generic_file_write_iter+0x2fa/0x650
[  287.720576]  __vfs_write+0x44e/0x630
[  287.724272]  ? kernel_read+0x110/0x110
[  287.728149]  ? rcu_read_lock_sched_held+0x10a/0x130
[  287.733145]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  287.737882]  vfs_write+0x192/0x4e0
[  287.741405]  SyS_write+0xf2/0x210
[  287.744858]  ? SyS_read+0x210/0x210
[  287.748478]  ? SyS_clock_settime+0x1a0/0x1a0
[  287.752895]  ? do_syscall_64+0x4c/0x640
[  287.756858]  ? SyS_read+0x210/0x210
[  287.760489]  do_syscall_64+0x1d5/0x640
[  287.764395]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  287.769579] RIP: 0033:0x45c479
05:48:03 executing program 3 (fault-call:3 fault-nth:5):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  287.772756] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  287.780452] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  287.787712] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  287.794969] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  287.802220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  287.809472] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000004
[  287.843773] CPU: 1 PID: 12087 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  287.851681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  287.861039] Call Trace:
[  287.863641]  dump_stack+0x13e/0x194
[  287.867287]  should_fail.cold+0x10a/0x14b
[  287.871434]  ? rpc_pipe_release+0x800/0x800
[  287.875737]  should_failslab+0xd6/0x130
[  287.879694]  kmem_cache_alloc_trace+0x2db/0x7b0
[  287.884521]  ? lock_downgrade+0x6e0/0x6e0
[  287.888669]  ? rpc_pipe_release+0x800/0x800
[  287.892987]  sget_userns+0x102/0xc30
[  287.896684]  ? get_empty_filp.cold+0x47/0x47
[  287.901076]  ? set_anon_super+0x20/0x20
[  287.905034]  ? rpc_pipe_release+0x800/0x800
[  287.909339]  mount_ns+0x65/0x180
[  287.912698]  mount_fs+0x92/0x2a0
[  287.912986] FAULT_INJECTION: forcing a failure.
[  287.912986] name failslab, interval 1, probability 0, space 0, times 0
[  287.916069]  vfs_kern_mount.part.0+0x5b/0x3c0
[  287.916082]  do_mount+0x3c9/0x24f0
[  287.916094]  ? copy_mount_string+0x40/0x40
[  287.916110]  ? __might_fault+0x177/0x1b0
[  287.943544]  ? _copy_from_user+0x94/0x100
[  287.947680]  ? memdup_user+0x54/0xa0
[  287.951376]  ? copy_mount_options+0x1ec/0x2e0
[  287.955852]  ? copy_mnt_ns+0x8a0/0x8a0
[  287.959732]  SyS_mount+0xa8/0x120
[  287.963168]  ? copy_mnt_ns+0x8a0/0x8a0
[  287.967038]  do_syscall_64+0x1d5/0x640
[  287.970917]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  287.976090] RIP: 0033:0x45c479
[  287.979262] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  287.986983] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  287.994250] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  288.001502] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  288.008761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  288.016117] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000004
[  288.023399] CPU: 0 PID: 12093 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  288.031283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  288.040622] Call Trace:
[  288.043199]  dump_stack+0x13e/0x194
[  288.046817]  should_fail.cold+0x10a/0x14b
[  288.050949]  ? rpc_pipe_release+0x800/0x800
[  288.055254]  should_failslab+0xd6/0x130
[  288.059208]  kmem_cache_alloc_trace+0x2db/0x7b0
[  288.063860]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  288.069312]  ? sget_userns+0x102/0xc30
[  288.073193]  ? rcu_read_lock_sched_held+0x10a/0x130
[  288.078228]  ? kmem_cache_alloc_trace+0x63e/0x7b0
[  288.083076]  ? rpc_pipe_release+0x800/0x800
[  288.087393]  selinux_sb_alloc_security+0x41/0x210
[  288.092231]  security_sb_alloc+0x66/0xa0
[  288.096283]  sget_userns+0x194/0xc30
[  288.099981]  ? get_empty_filp.cold+0x47/0x47
[  288.104376]  ? set_anon_super+0x20/0x20
[  288.108336]  ? rpc_pipe_release+0x800/0x800
[  288.112758]  mount_ns+0x65/0x180
[  288.116134]  mount_fs+0x92/0x2a0
[  288.119491]  vfs_kern_mount.part.0+0x5b/0x3c0
[  288.123975]  do_mount+0x3c9/0x24f0
[  288.127520]  ? copy_mount_string+0x40/0x40
[  288.131751]  ? __might_fault+0x177/0x1b0
[  288.135796]  ? _copy_from_user+0x94/0x100
[  288.139930]  ? memdup_user+0x54/0xa0
[  288.143625]  ? copy_mount_options+0x1ec/0x2e0
[  288.148101]  ? copy_mnt_ns+0x8a0/0x8a0
[  288.151971]  SyS_mount+0xa8/0x120
[  288.155407]  ? copy_mnt_ns+0x8a0/0x8a0
[  288.159277]  do_syscall_64+0x1d5/0x640
[  288.163149]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  288.168331] RIP: 0033:0x45c479
[  288.171501] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  288.179188] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  288.186438] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
05:48:04 executing program 5 (fault-call:7 fault-nth:5):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  288.193697] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  288.200955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  288.208205] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000005
05:48:04 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000003c0)={0x1, {{0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x65}}}, 0x88)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000340)=0xe8)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
r3 = socket(0xa, 0x5, 0x0)
setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={<r6=>0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc)
r7 = getuid()
setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001c40)={{{@in=@local, @in6=@dev={0xfe, 0x80, [], 0x2e}, 0x4e22, 0x8, 0x4e23, 0x3, 0xf, 0x0, 0x0, 0xff, r6, r7}, {0x8000, 0xfffffffffffffffb, 0x1000, 0x6, 0x9, 0xfffffffffffffbee, 0x2, 0x4}, {0x10001, 0x3, 0x3, 0x7}, 0x400, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in6=@mcast2, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x0, 0x3, 0x8, 0x3, 0x80000000, 0xfff}}, 0xe8)
r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
r9 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$TIPC_NL_BEARER_ENABLE(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x28, r8, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0)
sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)={0x174, r8, 0x800, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2800000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffffff81}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x2c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7d41}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x4080}, 0x20000000)
mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000480)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x244e0, &(0x7f0000000840)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_user='access=user'}], [{@hash='hash'}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@euid_lt={'euid<', r7}}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@obj_user={'obj_user', 0x3d, 'nfs\x00'}}]}})

05:48:04 executing program 0 (fault-call:3 fault-nth:5):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  288.357680] FAULT_INJECTION: forcing a failure.
[  288.357680] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  288.369524] CPU: 1 PID: 12109 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  288.377453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  288.385330] FAULT_INJECTION: forcing a failure.
[  288.385330] name failslab, interval 1, probability 0, space 0, times 0
[  288.386924] Call Trace:
[  288.386943]  dump_stack+0x13e/0x194
[  288.386961]  should_fail.cold+0x10a/0x14b
[  288.386976]  __alloc_pages_nodemask+0x1bf/0x700
[  288.386987]  ? trace_hardirqs_on+0x10/0x10
[  288.387001]  ? __alloc_pages_slowpath+0x26c0/0x26c0
[  288.422372]  ? find_held_lock+0x2d/0x110
[  288.426450]  cache_grow_begin+0x7b/0x410
[  288.430532]  kmem_cache_alloc_trace+0x6cf/0x7b0
[  288.435200]  ? rpc_pipe_release+0x800/0x800
[  288.439520]  sget_userns+0x102/0xc30
[  288.443242]  ? get_empty_filp.cold+0x47/0x47
[  288.447664]  ? set_anon_super+0x20/0x20
[  288.451633]  ? rpc_pipe_release+0x800/0x800
[  288.455948]  mount_ns+0x65/0x180
[  288.459304]  mount_fs+0x92/0x2a0
[  288.462678]  vfs_kern_mount.part.0+0x5b/0x3c0
[  288.467163]  do_mount+0x3c9/0x24f0
[  288.470692]  ? copy_mount_string+0x40/0x40
[  288.474913]  ? __might_fault+0x177/0x1b0
[  288.478974]  ? _copy_from_user+0x94/0x100
[  288.483120]  ? memdup_user+0x54/0xa0
[  288.486828]  ? copy_mount_options+0x1ec/0x2e0
[  288.491323]  ? copy_mnt_ns+0x8a0/0x8a0
[  288.495196]  SyS_mount+0xa8/0x120
[  288.498633]  ? copy_mnt_ns+0x8a0/0x8a0
[  288.502507]  do_syscall_64+0x1d5/0x640
[  288.506383]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  288.511555] RIP: 0033:0x45c479
[  288.514740] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  288.522436] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  288.529690] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  288.536947] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  288.544218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  288.551483] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000005
05:48:04 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r3=>0xffffffffffffffff})
dup2(r3, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000001)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x1f, 0x9, 0x4, 0x0, 0x7, {0x77359400}, {0x1, 0x0, 0xff, 0x3, 0x1, 0x8, "cfacd5da"}, 0x2, 0x1, @planes=&(0x7f0000000080)={0x1, 0x7, @userptr=0x8, 0x200}, 0x8, 0x0, <r4=>0xffffffffffffffff})
recvmsg$can_bcm(r4, &(0x7f00000002c0)={&(0x7f0000000180)=@isdn, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)=""/94, 0x5e}], 0x1}, 0x102)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
faccessat(r6, &(0x7f0000000300)='./file0\x00', 0x127, 0x1500)

[  288.558751] CPU: 0 PID: 12106 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  288.566641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  288.575999] Call Trace:
[  288.578592]  dump_stack+0x13e/0x194
[  288.582227]  should_fail.cold+0x10a/0x14b
[  288.586380]  should_failslab+0xd6/0x130
[  288.590358]  kmem_cache_alloc+0x2b5/0x770
[  288.594527]  ? recalc_bh_state+0x1f/0x170
[  288.598682]  ? check_preemption_disabled+0x35/0x240
[  288.603813]  alloc_buffer_head+0x20/0xd0
[  288.607855]  alloc_page_buffers+0xb3/0x1f0
[  288.612071]  ? fat_add_cluster+0xc0/0xc0
[  288.616113]  create_empty_buffers+0x36/0x470
[  288.620503]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  288.625935]  ? fat_add_cluster+0xc0/0xc0
[  288.630067]  create_page_buffers+0x14d/0x1c0
[  288.634462]  __block_write_begin_int+0x167/0x1030
[  288.639286]  ? fat_add_cluster+0xc0/0xc0
[  288.643382]  ? add_to_page_cache_lru+0x150/0x300
[  288.648120]  ? add_to_page_cache_locked+0x40/0x40
[  288.652992]  ? __page_cache_alloc+0xd9/0x3d0
[  288.657418]  ? __breadahead+0xd0/0xd0
[  288.661199]  ? pagecache_get_page+0x12c/0xa10
[  288.665720]  ? wait_for_stable_page+0xe3/0x270
[  288.670285]  ? fat_add_cluster+0xc0/0xc0
[  288.674325]  block_write_begin+0x58/0x260
[  288.678457]  cont_write_begin+0x3f0/0x710
[  288.682588]  ? pagecache_isize_extended+0x320/0x320
[  288.687585]  ? block_write_begin+0x260/0x260
[  288.691982]  ? current_time+0x16/0xb0
[  288.695792]  ? iov_iter_fault_in_readable+0x1be/0x390
[  288.700987]  fat_write_begin+0x89/0x110
[  288.704955]  ? fat_add_cluster+0xc0/0xc0
[  288.709004]  generic_perform_write+0x1c9/0x420
[  288.713588]  ? page_endio+0x520/0x520
[  288.717381]  ? generic_file_direct_write+0x2fa/0x420
[  288.722477]  __generic_file_write_iter+0x429/0x590
[  288.727398]  generic_file_write_iter+0x2fa/0x650
[  288.732148]  __vfs_write+0x44e/0x630
[  288.735847]  ? kernel_read+0x110/0x110
[  288.739723]  ? rcu_read_lock_sched_held+0x10a/0x130
[  288.744727]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  288.749584]  vfs_write+0x192/0x4e0
[  288.753203]  SyS_write+0xf2/0x210
[  288.756642]  ? SyS_read+0x210/0x210
[  288.760261]  ? SyS_clock_settime+0x1a0/0x1a0
[  288.764661]  ? do_syscall_64+0x4c/0x640
[  288.768658]  ? SyS_read+0x210/0x210
[  288.772269]  do_syscall_64+0x1d5/0x640
[  288.776144]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  288.781320] RIP: 0033:0x45c479
[  288.784493] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  288.792188] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  288.799446] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
05:48:05 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='westwood\x00', 0x9)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  288.806756] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  288.814046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  288.821299] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000005
05:48:05 executing program 3 (fault-call:3 fault-nth:6):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:05 executing program 5 (fault-call:7 fault-nth:6):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  288.951139] FAULT_INJECTION: forcing a failure.
[  288.951139] name failslab, interval 1, probability 0, space 0, times 0
[  288.962743] CPU: 0 PID: 12128 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  288.970634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  288.980096] Call Trace:
[  288.982688]  dump_stack+0x13e/0x194
[  288.986327]  should_fail.cold+0x10a/0x14b
[  288.990486]  should_failslab+0xd6/0x130
[  288.994479]  __kmalloc+0x2e9/0x7c0
[  288.998027]  ? __list_lru_init+0x56/0x650
[  289.002176]  ? __list_lru_init+0x67/0x650
[  289.004639] FAULT_INJECTION: forcing a failure.
[  289.004639] name failslab, interval 1, probability 0, space 0, times 0
[  289.006329]  __list_lru_init+0x67/0x650
[  289.021505]  sget_userns+0x4e4/0xc30
[  289.025215]  ? get_empty_filp.cold+0x47/0x47
[  289.029617]  ? set_anon_super+0x20/0x20
[  289.033584]  ? rpc_pipe_release+0x800/0x800
[  289.037894]  mount_ns+0x65/0x180
[  289.041267]  mount_fs+0x92/0x2a0
[  289.044639]  vfs_kern_mount.part.0+0x5b/0x3c0
[  289.049120]  do_mount+0x3c9/0x24f0
[  289.052651]  ? copy_mount_string+0x40/0x40
[  289.056869]  ? __might_fault+0x177/0x1b0
[  289.060921]  ? _copy_from_user+0x94/0x100
[  289.065071]  ? memdup_user+0x54/0xa0
[  289.068776]  ? copy_mount_options+0x1ec/0x2e0
[  289.073262]  ? copy_mnt_ns+0x8a0/0x8a0
[  289.077148]  SyS_mount+0xa8/0x120
[  289.080704]  ? copy_mnt_ns+0x8a0/0x8a0
[  289.084597]  do_syscall_64+0x1d5/0x640
[  289.088477]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  289.093658] RIP: 0033:0x45c479
[  289.096835] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  289.104539] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  289.111798] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  289.119061] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  289.126318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  289.133597] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000006
[  289.147770] CPU: 1 PID: 12133 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  289.155768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  289.165226] Call Trace:
[  289.167829]  dump_stack+0x13e/0x194
[  289.171463]  should_fail.cold+0x10a/0x14b
[  289.175647]  should_failslab+0xd6/0x130
[  289.179671]  kmem_cache_alloc+0x2b5/0x770
[  289.183815]  ? recalc_bh_state+0x1f/0x170
[  289.187952]  ? check_preemption_disabled+0x35/0x240
[  289.192961]  alloc_buffer_head+0x20/0xd0
[  289.197019]  alloc_page_buffers+0xb3/0x1f0
[  289.201266]  ? fat_add_cluster+0xc0/0xc0
[  289.205446]  create_empty_buffers+0x36/0x470
[  289.209875]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  289.215439]  ? fat_add_cluster+0xc0/0xc0
[  289.219498]  create_page_buffers+0x14d/0x1c0
[  289.223906]  __block_write_begin_int+0x167/0x1030
[  289.228740]  ? fat_add_cluster+0xc0/0xc0
[  289.232784]  ? add_to_page_cache_lru+0x150/0x300
[  289.237537]  ? add_to_page_cache_locked+0x40/0x40
[  289.242373]  ? __page_cache_alloc+0xd9/0x3d0
[  289.246774]  ? __breadahead+0xd0/0xd0
[  289.250560]  ? pagecache_get_page+0x12c/0xa10
[  289.255035]  ? wait_for_stable_page+0xe3/0x270
[  289.259599]  ? fat_add_cluster+0xc0/0xc0
[  289.263645]  block_write_begin+0x58/0x260
[  289.267791]  cont_write_begin+0x3f0/0x710
[  289.271936]  ? pagecache_isize_extended+0x320/0x320
[  289.276976]  ? block_write_begin+0x260/0x260
[  289.281372]  ? current_time+0x16/0xb0
[  289.285161]  ? iov_iter_fault_in_readable+0x1be/0x390
[  289.290336]  fat_write_begin+0x89/0x110
[  289.294346]  ? fat_add_cluster+0xc0/0xc0
[  289.298400]  generic_perform_write+0x1c9/0x420
[  289.302977]  ? page_endio+0x520/0x520
[  289.306804]  ? generic_file_direct_write+0x2fa/0x420
[  289.311899]  __generic_file_write_iter+0x429/0x590
[  289.316825]  generic_file_write_iter+0x2fa/0x650
[  289.321576]  __vfs_write+0x44e/0x630
[  289.325288]  ? kernel_read+0x110/0x110
[  289.329178]  ? rcu_read_lock_sched_held+0x10a/0x130
[  289.334186]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  289.338966]  vfs_write+0x192/0x4e0
[  289.342497]  SyS_write+0xf2/0x210
[  289.345940]  ? SyS_read+0x210/0x210
[  289.349561]  ? SyS_clock_settime+0x1a0/0x1a0
[  289.353967]  ? do_syscall_64+0x4c/0x640
[  289.357935]  ? SyS_read+0x210/0x210
[  289.361548]  do_syscall_64+0x1d5/0x640
[  289.365491]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  289.370675] RIP: 0033:0x45c479
[  289.373851] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  289.381551] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  289.388806] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  289.396102] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
05:48:05 executing program 0 (fault-call:3 fault-nth:6):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:05 executing program 1:
timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000200)=<r0=>0x0)
timer_delete(r0)
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r1 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2)
clock_gettime(0x0, &(0x7f0000000100)={<r2=>0x0, <r3=>0x0})
socket$rxrpc(0x21, 0x2, 0x2)
r4 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000140)={0xb1f9, 0x6, 0x4, 0x40000000, 0x1c00000, {r2, r3/1000+10000}, {0x5, 0x8, 0x4, 0x3, 0x20, 0x8, "dc4d90c7"}, 0x3, 0x3, @fd, 0x3, 0x0, r4})
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  289.403359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  289.410613] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000006
05:48:05 executing program 5 (fault-call:7 fault-nth:7):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

05:48:05 executing program 4:
mkdir(&(0x7f0000000100)='./file0\x00', 0x74)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  289.545676] FAULT_INJECTION: forcing a failure.
[  289.545676] name failslab, interval 1, probability 0, space 0, times 0
[  289.559551] CPU: 1 PID: 12146 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  289.567456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  289.576807] Call Trace:
[  289.579406]  dump_stack+0x13e/0x194
[  289.583065]  should_fail.cold+0x10a/0x14b
[  289.587223]  should_failslab+0xd6/0x130
[  289.591198]  __kmalloc+0x2e9/0x7c0
[  289.594743]  ? __list_lru_init+0x56/0x650
[  289.598000] FAULT_INJECTION: forcing a failure.
[  289.598000] name failslab, interval 1, probability 0, space 0, times 0
[  289.598888]  ? __list_lru_init+0x67/0x650
[  289.598907]  __list_lru_init+0x67/0x650
[  289.598921]  sget_userns+0x4e4/0xc30
[  289.598933]  ? get_empty_filp.cold+0x47/0x47
[  289.626289]  ? set_anon_super+0x20/0x20
[  289.630263]  ? rpc_pipe_release+0x800/0x800
[  289.634578]  mount_ns+0x65/0x180
[  289.637935]  mount_fs+0x92/0x2a0
[  289.641292]  vfs_kern_mount.part.0+0x5b/0x3c0
[  289.645775]  do_mount+0x3c9/0x24f0
[  289.649311]  ? copy_mount_string+0x40/0x40
[  289.653534]  ? __might_fault+0x177/0x1b0
[  289.657591]  ? _copy_from_user+0x94/0x100
[  289.661732]  ? memdup_user+0x54/0xa0
[  289.665435]  ? copy_mount_options+0x1ec/0x2e0
[  289.669926]  ? copy_mnt_ns+0x8a0/0x8a0
[  289.673804]  SyS_mount+0xa8/0x120
[  289.677238]  ? copy_mnt_ns+0x8a0/0x8a0
[  289.681113]  do_syscall_64+0x1d5/0x640
[  289.684989]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  289.690162] RIP: 0033:0x45c479
[  289.693333] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  289.701025] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  289.708274] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  289.715525] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  289.722777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  289.730032] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000006
[  289.762056] CPU: 0 PID: 12151 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  289.769978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  289.779440] Call Trace:
[  289.782038]  dump_stack+0x13e/0x194
[  289.785681]  should_fail.cold+0x10a/0x14b
[  289.789838]  should_failslab+0xd6/0x130
[  289.793817]  kmem_cache_alloc+0x2b5/0x770
[  289.797975]  ? recalc_bh_state+0x1f/0x170
[  289.802125]  ? check_preemption_disabled+0x35/0x240
[  289.807151]  alloc_buffer_head+0x20/0xd0
05:48:05 executing program 3 (fault-call:3 fault-nth:7):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  289.811309]  alloc_page_buffers+0xb3/0x1f0
[  289.815563]  ? fat_add_cluster+0xc0/0xc0
[  289.819624]  create_empty_buffers+0x36/0x470
[  289.824036]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  289.829492]  ? fat_add_cluster+0xc0/0xc0
[  289.833557]  create_page_buffers+0x14d/0x1c0
[  289.837970]  __block_write_begin_int+0x167/0x1030
[  289.842815]  ? fat_add_cluster+0xc0/0xc0
[  289.846877]  ? add_to_page_cache_lru+0x150/0x300
[  289.851636]  ? add_to_page_cache_locked+0x40/0x40
[  289.856490]  ? __page_cache_alloc+0xd9/0x3d0
[  289.860902]  ? __breadahead+0xd0/0xd0
[  289.864705]  ? pagecache_get_page+0x12c/0xa10
[  289.869204]  ? wait_for_stable_page+0xe3/0x270
[  289.873792]  ? fat_add_cluster+0xc0/0xc0
[  289.877852]  block_write_begin+0x58/0x260
[  289.882005]  cont_write_begin+0x3f0/0x710
[  289.886158]  ? pagecache_isize_extended+0x320/0x320
[  289.891187]  ? block_write_begin+0x260/0x260
[  289.895585]  ? current_time+0x16/0xb0
[  289.899371]  ? iov_iter_fault_in_readable+0x1be/0x390
[  289.904546]  fat_write_begin+0x89/0x110
[  289.908500]  ? fat_add_cluster+0xc0/0xc0
[  289.912557]  generic_perform_write+0x1c9/0x420
[  289.917143]  ? page_endio+0x520/0x520
[  289.919761] FAULT_INJECTION: forcing a failure.
[  289.919761] name failslab, interval 1, probability 0, space 0, times 0
[  289.920941]  ? generic_file_direct_write+0x2fa/0x420
[  289.920958]  __generic_file_write_iter+0x429/0x590
[  289.920973]  generic_file_write_iter+0x2fa/0x650
[  289.920986]  __vfs_write+0x44e/0x630
[  289.920998]  ? kernel_read+0x110/0x110
[  289.921021]  ? rcu_read_lock_sched_held+0x10a/0x130
[  289.921030]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  289.921040]  vfs_write+0x192/0x4e0
[  289.921050]  SyS_write+0xf2/0x210
[  289.921057]  ? SyS_read+0x210/0x210
[  289.921072]  ? SyS_clock_settime+0x1a0/0x1a0
[  289.979192]  ? do_syscall_64+0x4c/0x640
[  289.983153]  ? SyS_read+0x210/0x210
[  289.986881]  do_syscall_64+0x1d5/0x640
[  289.990781]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  289.995972] RIP: 0033:0x45c479
[  289.999158] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  290.006857] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  290.014113] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  290.021372] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  290.028627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  290.035891] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000007
[  290.043175] CPU: 1 PID: 12168 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  290.051064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  290.060416] Call Trace:
[  290.062997]  dump_stack+0x13e/0x194
[  290.066626]  should_fail.cold+0x10a/0x14b
[  290.070763]  should_failslab+0xd6/0x130
[  290.074722]  __kmalloc+0x2e9/0x7c0
[  290.078257]  ? __list_lru_init+0x56/0x650
[  290.082399]  ? __list_lru_init+0x67/0x650
[  290.086548]  __list_lru_init+0x67/0x650
[  290.090509]  sget_userns+0x504/0xc30
[  290.094204]  ? get_empty_filp.cold+0x47/0x47
[  290.098599]  ? set_anon_super+0x20/0x20
[  290.102556]  ? rpc_pipe_release+0x800/0x800
[  290.106859]  mount_ns+0x65/0x180
[  290.110218]  mount_fs+0x92/0x2a0
[  290.113567]  vfs_kern_mount.part.0+0x5b/0x3c0
[  290.118043]  do_mount+0x3c9/0x24f0
[  290.121577]  ? copy_mount_string+0x40/0x40
[  290.125791]  ? __might_fault+0x177/0x1b0
[  290.129835]  ? _copy_from_user+0x94/0x100
[  290.133965]  ? memdup_user+0x54/0xa0
[  290.137658]  ? copy_mount_options+0x1ec/0x2e0
[  290.142145]  ? copy_mnt_ns+0x8a0/0x8a0
[  290.146029]  SyS_mount+0xa8/0x120
[  290.149475]  ? copy_mnt_ns+0x8a0/0x8a0
[  290.153352]  do_syscall_64+0x1d5/0x640
[  290.157228]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
05:48:06 executing program 5 (fault-call:7 fault-nth:8):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  290.162413] RIP: 0033:0x45c479
[  290.165588] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  290.173281] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  290.180533] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  290.187812] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  290.195064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  290.202314] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000007
05:48:06 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nf_conntrack_expect\x00')
ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000006c0)={0x990000, 0x20, 0x1c6, <r2=>0xffffffffffffffff, 0x0, &(0x7f0000000680)={0x990a71, 0x3, [], @value=0xc120}})
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
r6 = fcntl$dupfd(r5, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r8=>0xffffffffffffffff})
dup2(r8, r7)
r9 = socket$nl_sock_diag(0x10, 0x3, 0x4)
r10 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r11=>0xffffffffffffffff})
dup2(r11, r10)
r12 = getpid()
sched_setattr(r12, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r13 = geteuid()
r14 = getegid()
r15 = socket$inet6_tcp(0xa, 0x1, 0x0)
r16 = fcntl$dupfd(r15, 0x0, r15)
ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200)
ioctl$TIOCGSID(r16, 0x5429, &(0x7f0000000700)=<r17=>0x0)
r18 = socket$inet6_sctp(0xa, 0x1, 0x84)
r19 = socket(0xa, 0x5, 0x0)
setsockopt$inet_int(r19, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
getsockopt$inet_pktinfo(r19, 0x0, 0x8, &(0x7f0000000140)={<r20=>0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc)
r21 = getuid()
setsockopt$inet6_IPV6_XFRM_POLICY(r18, 0x29, 0x23, &(0x7f0000001c40)={{{@in6=@local, @in6=@dev={0xfe, 0x80, [], 0x2e}, 0x4e22, 0x8, 0x4e23, 0x3, 0xf, 0x0, 0x0, 0xff, r20, r21}, {0x8000, 0xfffffffffffffffb, 0x1000, 0x6, 0x9, 0xfffffffffffffbee, 0x2, 0x4}, {0x10001, 0x3, 0x3, 0x7}, 0x400, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in6=@mcast2, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x1, 0x0, 0x8, 0x3, 0x80000000, 0xfff}}, 0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, <r22=>0x0}, &(0x7f0000000780)=0xc)
r23 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(r23, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00', 0x1c})
ioctl$UI_DEV_CREATE(r23, 0x5501)
ioctl$UI_DEV_DESTROY(r23, 0x5502)
r24 = socket$inet6_tcp(0xa, 0x1, 0x0)
r25 = fcntl$dupfd(r24, 0x0, r24)
ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200)
r26 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r27=>0xffffffffffffffff})
dup2(r27, r26)
r28 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000800)=0x10, 0x0)
r29 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000840)='/dev/urandom\x00', 0x503841, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r30=>0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000980)=0xe8)
r31 = getegid()
r32 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r32, 0x0, r32)
sendmmsg$unix(r1, &(0x7f0000000b00)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000180)="440d7853b198bb30d87653137ea31cf4010e8122ca5d19db8983912f8604aca790f4c3c5dbe87ac6451bbd84918c643c69a1d88dc376c5ec4d78981936957372734a2d724ac9b1076d6da23197b3e5762d3e08460476a1c5415c558bd6145b8839eeb5b4d8607cf35d9d0d042b0ce3906fae3b3bc5bd4e553de12f14237b13ad5a91fca2862b63425cdfe6e72fd6af330d0daec78752aa6f11e6089e6a2cf81126ed7d1319699d0dd1cf87e51f97b186b6312314dfc7281588ff269e4319c3dc281d8630069225ade37a0fab26e034a3f327a92a5a19ffd30d", 0xd9}, {&(0x7f0000000280)="f31802c1286ac913824dc3bf4bef89aa913f6887e7a450ea0863df7e6888acee8e5b189260a05392146ef70673fe4738e91ff675f64882e255f6bd9a85e6a982448e0392988fb23bb6eb766cd3a2062118e98cff4e3b1a508942f80d4cd4872de768ab886bfa2cf50d06e49fc10be812e14648bf38f91eb90df7c5fced1333fa38520c78b5b3ac80c30147b2fec6ede3a3a8bfd7d999fe96bb5c6a58", 0x9c}, {&(0x7f00000003c0)="75bef0fb8e185d4e5ff0ce567403e163a4ae719315cb9e6119c64a4ea851ed24416118b20ed9922f37f8f4530db702e6a3e7597a9197322564e11c68f57c8d454e9cf969e9d26ca69b91382bc0451dc224c5f9d66952745a630d0e377482311985f11ca06228a0854c4af16dd33726b16011bf315171236a63e3f6525d49c68b8a0842a3f601ce9a769e84aa29ebc57e94d51be8", 0x94}, {&(0x7f0000000340)="48726edadc3ff2c0b08ca445dbb1bf02822888c1f8ca89", 0x17}, {&(0x7f0000000480)="e25ed2918097813616045e94fac13ba09c6eedbcaf7b851def3161253d97705b433e2c47e589565e660ac18a6ced24d7b6df208dcdb04cd051c8279d724127b19d5446", 0x43}, {&(0x7f0000000500)="d577dedcddd13690f574e84f504fcc9c5fda7e3522af73a2ba2502232c6430f0ea12d6b6baa4ec9cfa9a3a22e30660f910ace27752bc15", 0x37}, {&(0x7f0000000540)="f5478ee04de2d834ae99ba956a0c8ebdb843e1b4804de7fec45e0fc5928a92715a7f89d9970ea76c58e08e69a17431e69fd9a731fa4e16e08e715094536918485ca14fae6fd7680c9ef4617fb93fc41b8d0ad0573fee3684cc8104242dd0abab22bac8592725e27a3ec79933281163c2ae98f810bb2f484f049387c0ba026cd76cd9e8cfd8682cdd428795065f5ec1445be420fafb4aab0483d9c3aa83846bcce005f6d460ff658e80ceafc9adea86feb65cd18de7391c6bcd5d1135", 0xbc}], 0x7, &(0x7f00000009c0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x2c, 0x1, 0x1, [r4, r0, r6, r7, 0xffffffffffffffff, r9, r10]}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}, @cred={{0x1c, 0x1, 0x2, {r17, r21, r22}}}, @rights={{0x1c, 0x1, 0x1, [r0, r23, r25]}}, @rights={{0x24, 0x1, 0x1, [r0, r27, r0, r28, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r29]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r30, r31}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r32, 0xffffffffffffffff]}}], 0x128, 0x4000008}], 0x1, 0x4000)

05:48:06 executing program 0 (fault-call:3 fault-nth:7):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:06 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = getegid()
mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x100000, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x1ff}}, {@common=@dfltgid={'dfltgid', 0x3d, r0}}, {@rq={'rq', 0x3d, 0xee}}], [{@obj_role={'obj_role', 0x3d, 'nfs\x00'}}]}})
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  290.350450] FAULT_INJECTION: forcing a failure.
[  290.350450] name failslab, interval 1, probability 0, space 0, times 0
[  290.379373] FAULT_INJECTION: forcing a failure.
[  290.379373] name failslab, interval 1, probability 0, space 0, times 0
05:48:06 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r1=>0xffffffffffffffff})
dup2(r1, r0)
ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000080))
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  290.403055] CPU: 1 PID: 12184 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  290.410970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  290.420322] Call Trace:
[  290.422912]  dump_stack+0x13e/0x194
[  290.426541]  should_fail.cold+0x10a/0x14b
[  290.430692]  should_failslab+0xd6/0x130
[  290.434668]  __kmalloc+0x2e9/0x7c0
[  290.438195]  ? __list_lru_init+0x56/0x650
[  290.442327]  ? __list_lru_init+0x67/0x650
[  290.446488]  __list_lru_init+0x67/0x650
[  290.450469]  sget_userns+0x504/0xc30
[  290.454169]  ? get_empty_filp.cold+0x47/0x47
[  290.458562]  ? set_anon_super+0x20/0x20
[  290.462645]  ? rpc_pipe_release+0x800/0x800
[  290.466964]  mount_ns+0x65/0x180
[  290.470324]  mount_fs+0x92/0x2a0
[  290.473719]  vfs_kern_mount.part.0+0x5b/0x3c0
[  290.478205]  do_mount+0x3c9/0x24f0
[  290.481748]  ? copy_mount_string+0x40/0x40
[  290.485977]  ? __might_fault+0x177/0x1b0
[  290.490030]  ? _copy_from_user+0x94/0x100
[  290.494181]  ? memdup_user+0x54/0xa0
[  290.497904]  ? copy_mount_options+0x1ec/0x2e0
[  290.502384]  ? copy_mnt_ns+0x8a0/0x8a0
[  290.506270]  SyS_mount+0xa8/0x120
[  290.509737]  ? copy_mnt_ns+0x8a0/0x8a0
[  290.513630]  do_syscall_64+0x1d5/0x640
[  290.517519]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  290.522693] RIP: 0033:0x45c479
[  290.525902] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  290.533604] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  290.540873] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  290.548142] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  290.555404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  290.562663] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000007
[  290.569957] CPU: 0 PID: 12174 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  290.577849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  290.587197] Call Trace:
[  290.589775]  dump_stack+0x13e/0x194
[  290.593391]  should_fail.cold+0x10a/0x14b
[  290.597529]  should_failslab+0xd6/0x130
[  290.601486]  kmem_cache_alloc+0x2b5/0x770
[  290.605619]  ? recalc_bh_state+0x1f/0x170
[  290.609750]  ? check_preemption_disabled+0x35/0x240
[  290.614763]  alloc_buffer_head+0x20/0xd0
[  290.618815]  alloc_page_buffers+0xb3/0x1f0
[  290.623108]  ? fat_add_cluster+0xc0/0xc0
[  290.627155]  create_empty_buffers+0x36/0x470
[  290.631545]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[  290.637012]  ? fat_add_cluster+0xc0/0xc0
[  290.641054]  create_page_buffers+0x14d/0x1c0
[  290.645445]  __block_write_begin_int+0x167/0x1030
[  290.650269]  ? fat_add_cluster+0xc0/0xc0
[  290.654313]  ? add_to_page_cache_lru+0x150/0x300
[  290.659063]  ? add_to_page_cache_locked+0x40/0x40
[  290.663900]  ? __page_cache_alloc+0xd9/0x3d0
[  290.668294]  ? __breadahead+0xd0/0xd0
[  290.672086]  ? pagecache_get_page+0x12c/0xa10
[  290.676581]  ? wait_for_stable_page+0xe3/0x270
[  290.681150]  ? fat_add_cluster+0xc0/0xc0
[  290.685190]  block_write_begin+0x58/0x260
[  290.689365]  cont_write_begin+0x3f0/0x710
[  290.693543]  ? pagecache_isize_extended+0x320/0x320
[  290.698546]  ? block_write_begin+0x260/0x260
[  290.702971]  ? current_time+0x16/0xb0
[  290.706763]  ? iov_iter_fault_in_readable+0x1be/0x390
[  290.711934]  fat_write_begin+0x89/0x110
[  290.715888]  ? fat_add_cluster+0xc0/0xc0
[  290.719941]  generic_perform_write+0x1c9/0x420
[  290.724507]  ? page_endio+0x520/0x520
[  290.728296]  ? generic_file_direct_write+0x2fa/0x420
[  290.733394]  __generic_file_write_iter+0x429/0x590
[  290.738306]  generic_file_write_iter+0x2fa/0x650
[  290.743044]  __vfs_write+0x44e/0x630
[  290.746739]  ? kernel_read+0x110/0x110
[  290.750614]  ? rcu_read_lock_sched_held+0x10a/0x130
[  290.755613]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  290.760356]  vfs_write+0x192/0x4e0
[  290.763922]  SyS_write+0xf2/0x210
[  290.767395]  ? SyS_read+0x210/0x210
[  290.771006]  ? SyS_clock_settime+0x1a0/0x1a0
[  290.775395]  ? do_syscall_64+0x4c/0x640
[  290.779351]  ? SyS_read+0x210/0x210
[  290.783006]  do_syscall_64+0x1d5/0x640
[  290.786881]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  290.792058] RIP: 0033:0x45c479
[  290.795226] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
05:48:07 executing program 3 (fault-call:3 fault-nth:8):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  290.802911] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  290.810162] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  290.817415] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  290.824664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  290.831930] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000008
05:48:07 executing program 5 (fault-call:7 fault-nth:9):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

05:48:07 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r2=>0xffffffffffffffff})
dup2(r2, r1)
r3 = socket$inet6_sctp(0xa, 0x1, 0x84)
r4 = socket(0xa, 0x5, 0x0)
setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={<r5=>0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc)
r6 = getuid()
setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001c40)={{{@in6=@local, @in6=@dev={0xfe, 0x80, [], 0x2e}, 0x4e22, 0x8, 0x4e23, 0x3, 0xf, 0x0, 0x0, 0xff, r5, r6}, {0x8000, 0xfffffffffffffffb, 0x1000, 0x6, 0x9, 0xfffffffffffffbee, 0x2, 0x4}, {0x10001, 0x3, 0x3, 0x7}, 0x400, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in6=@mcast2, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x1, 0x0, 0x8, 0x3, 0x80000000, 0xfff}}, 0xe8)
r7 = socket$inet6_sctp(0xa, 0x1, 0x84)
r8 = socket(0xa, 0x5, 0x0)
setsockopt$inet_int(r8, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4)
getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={<r9=>0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc)
r10 = getuid()
setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000001c40)={{{@in6=@local, @in6=@dev={0xfe, 0x80, [], 0x2e}, 0x4e22, 0x8, 0x4e23, 0x3, 0xf, 0x0, 0x0, 0xff, r9, r10}, {0x8000, 0xfffffffffffffffb, 0x1000, 0x6, 0x9, 0xfffffffffffffbee, 0x2, 0x4}, {0x10001, 0x3, 0x3, 0x7}, 0x400, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in6=@mcast2, 0x4d5, 0x33}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x1, 0x0, 0x8, 0x3, 0x80000000, 0xfff}}, 0xe8)
mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20040, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose='cache=loose'}], [{@euid_gt={'euid>', r6}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@smackfsroot={'smackfsroot', 0x3d, '@[wlan0{*'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}, {@audit='audit'}, {@obj_user={'obj_user', 0x3d, ']em1}wlan0$@proc'}}, {@fowner_gt={'fowner>', r10}}]}})
clock_gettime(0x0, &(0x7f0000000080)={<r11=>0x0, <r12=>0x0})
r13 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4, 0x0)
pipe(&(0x7f0000000500)={<r14=>0xffffffffffffffff})
dup2(r14, r13)
ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x93, 0x9, 0x4, 0x4, 0x87b, {r11, r12/1000+30000}, {0x6, 0x8, 0x2, 0xcf, 0x0, 0x8, "57b99400"}, 0x7fff, 0x1, @userptr=0xffffffffffffff27, 0x6, 0x0, <r15=>r14})
connect$unix(r15, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e21}, 0x6e)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
clock_gettime(0x4, &(0x7f0000000200))
r16 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x1000, 0x400002)
sendmsg$TIPC_CMD_GET_NETID(r16, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x10, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x814}, 0x4000000)

[  290.982731] FAULT_INJECTION: forcing a failure.
[  290.982731] name failslab, interval 1, probability 0, space 0, times 0
[  290.994724] CPU: 1 PID: 12200 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  291.002607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  291.011956] Call Trace:
[  291.014592]  dump_stack+0x13e/0x194
[  291.018223]  should_fail.cold+0x10a/0x14b
[  291.022383]  should_failslab+0xd6/0x130
[  291.026363]  __kmalloc+0x2e9/0x7c0
[  291.029913]  ? register_shrinker+0xb8/0x210
[  291.034242]  ? lock_downgrade+0x6e0/0x6e0
[  291.038404]  register_shrinker+0xb8/0x210
[  291.042554]  sget_userns+0x9c5/0xc30
[  291.046262]  ? get_empty_filp.cold+0x47/0x47
[  291.050651]  ? set_anon_super+0x20/0x20
[  291.054606]  ? rpc_pipe_release+0x800/0x800
[  291.058917]  mount_ns+0x65/0x180
[  291.062282]  mount_fs+0x92/0x2a0
[  291.065655]  vfs_kern_mount.part.0+0x5b/0x3c0
[  291.070138]  do_mount+0x3c9/0x24f0
[  291.073661]  ? copy_mount_string+0x40/0x40
[  291.077882]  ? __might_fault+0x177/0x1b0
[  291.081928]  ? _copy_from_user+0x94/0x100
[  291.086062]  ? memdup_user+0x54/0xa0
[  291.089758]  ? copy_mount_options+0x1ec/0x2e0
[  291.094264]  ? copy_mnt_ns+0x8a0/0x8a0
[  291.098135]  SyS_mount+0xa8/0x120
[  291.101568]  ? copy_mnt_ns+0x8a0/0x8a0
[  291.105496]  do_syscall_64+0x1d5/0x640
[  291.109379]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  291.114564] RIP: 0033:0x45c479
[  291.117755] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  291.125447] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
05:48:07 executing program 0 (fault-call:3 fault-nth:8):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  291.132710] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  291.140155] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  291.147417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  291.154671] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000008
[  291.211275] FAULT_INJECTION: forcing a failure.
[  291.211275] name failslab, interval 1, probability 0, space 0, times 0
[  291.223637] CPU: 0 PID: 12214 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  291.231540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  291.240899] Call Trace:
[  291.243496]  dump_stack+0x13e/0x194
[  291.247133]  should_fail.cold+0x10a/0x14b
[  291.251290]  should_failslab+0xd6/0x130
[  291.255271]  kmem_cache_alloc+0x44/0x770
[  291.259345]  ? mempool_free+0x1d0/0x1d0
[  291.263321]  mempool_alloc+0x111/0x2d0
[  291.267213]  ? remove_element.isra.0+0x1b0/0x1b0
[  291.271973]  ? __lock_acquire+0x5f7/0x4620
[  291.276213]  ? __lock_acquire+0x5f7/0x4620
[  291.280553]  bio_alloc_bioset+0x352/0x640
[  291.284715]  ? bvec_alloc+0x2d0/0x2d0
[  291.285838] FAULT_INJECTION: forcing a failure.
[  291.285838] name failslab, interval 1, probability 0, space 0, times 0
[  291.288522]  ? __lock_acquire+0x5f7/0x4620
[  291.288597]  mpage_alloc.isra.0+0x5b/0x2a0
[  291.288613]  __mpage_writepage+0xd5d/0x1220
[  291.312547]  ? trace_hardirqs_on+0x10/0x10
[  291.316779]  ? clean_buffers+0x1d0/0x1d0
[  291.320831]  ? find_held_lock+0x2d/0x110
[  291.324898]  ? clear_page_dirty_for_io+0x347/0x7e0
[  291.329934]  ? save_trace+0x290/0x290
[  291.333737]  ? __lock_is_held+0xad/0x140
[  291.337792]  write_cache_pages+0x411/0xd60
[  291.342027]  ? clean_buffers+0x1d0/0x1d0
[  291.346089]  ? clear_page_dirty_for_io+0x7e0/0x7e0
[  291.351005]  ? memset+0x20/0x40
[  291.354270]  ? save_trace+0x290/0x290
[  291.358068]  ? __lock_acquire+0x5f7/0x4620
[  291.362297]  ? fat_add_cluster+0xc0/0xc0
[  291.366350]  mpage_writepages+0xc8/0x200
[  291.370404]  ? mpage_end_io+0x1a0/0x1a0
[  291.374375]  ? fat_add_cluster+0xc0/0xc0
[  291.378422]  ? save_trace+0x290/0x290
[  291.382217]  ? find_held_lock+0x2d/0x110
[  291.386275]  ? fat_readpages+0x30/0x30
[  291.390168]  do_writepages+0xd0/0x250
[  291.393957]  ? block_write_end+0x42/0xf0
[  291.398019]  ? page_writeback_cpu_online+0x10/0x10
[  291.402942]  ? lock_acquire+0x170/0x3f0
[  291.406977]  ? do_raw_spin_unlock+0x164/0x250
[  291.411476]  ? _raw_spin_unlock+0x29/0x40
[  291.415612]  ? wbc_attach_and_unlock_inode+0x5bb/0x8e0
[  291.420884]  __filemap_fdatawrite_range+0x236/0x310
[  291.425899]  ? replace_page_cache_page+0x6f0/0x6f0
[  291.430825]  ? generic_file_direct_write+0x2fa/0x420
[  291.435916]  filemap_write_and_wait_range+0x39/0xb0
[  291.440926]  __generic_file_write_iter+0x456/0x590
[  291.445863]  generic_file_write_iter+0x2fa/0x650
[  291.450609]  __vfs_write+0x44e/0x630
[  291.454311]  ? kernel_read+0x110/0x110
[  291.458205]  ? rcu_read_lock_sched_held+0x10a/0x130
[  291.463225]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  291.467974]  vfs_write+0x192/0x4e0
[  291.471508]  SyS_write+0xf2/0x210
[  291.474957]  ? SyS_read+0x210/0x210
[  291.478573]  ? SyS_clock_settime+0x1a0/0x1a0
[  291.482976]  ? do_syscall_64+0x4c/0x640
[  291.486946]  ? SyS_read+0x210/0x210
[  291.490563]  do_syscall_64+0x1d5/0x640
[  291.494440]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  291.499610] RIP: 0033:0x45c479
[  291.502787] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
05:48:07 executing program 5 (fault-call:7 fault-nth:10):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  291.510487] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  291.517740] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  291.525011] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  291.532266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  291.539517] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 0000000000000009
[  291.546785] CPU: 1 PID: 12218 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  291.554675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  291.564024] Call Trace:
[  291.566617]  dump_stack+0x13e/0x194
[  291.570229]  should_fail.cold+0x10a/0x14b
[  291.574361]  should_failslab+0xd6/0x130
[  291.578350]  __kmalloc+0x2e9/0x7c0
[  291.581888]  ? register_shrinker+0xb8/0x210
[  291.586207]  ? lock_downgrade+0x6e0/0x6e0
[  291.590342]  register_shrinker+0xb8/0x210
[  291.594476]  sget_userns+0x9c5/0xc30
[  291.598179]  ? get_empty_filp.cold+0x47/0x47
[  291.602580]  ? set_anon_super+0x20/0x20
[  291.606541]  ? rpc_pipe_release+0x800/0x800
[  291.610852]  mount_ns+0x65/0x180
[  291.614211]  mount_fs+0x92/0x2a0
[  291.617564]  vfs_kern_mount.part.0+0x5b/0x3c0
[  291.622042]  do_mount+0x3c9/0x24f0
[  291.625568]  ? copy_mount_string+0x40/0x40
[  291.629832]  ? __might_fault+0x177/0x1b0
[  291.633883]  ? _copy_from_user+0x94/0x100
[  291.638014]  ? memdup_user+0x54/0xa0
[  291.641713]  ? copy_mount_options+0x1ec/0x2e0
[  291.646214]  ? copy_mnt_ns+0x8a0/0x8a0
[  291.650092]  SyS_mount+0xa8/0x120
[  291.653525]  ? copy_mnt_ns+0x8a0/0x8a0
[  291.657406]  do_syscall_64+0x1d5/0x640
[  291.661287]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  291.666460] RIP: 0033:0x45c479
[  291.669643] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  291.677331] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
[  291.684583] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  291.691831] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  291.699082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  291.706333] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000008
05:48:07 executing program 3 (fault-call:3 fault-nth:9):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:07 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x4, &(0x7f0000000200)='\x85^\xd3a\x03\x00;f\xb0\xcdKe\xa0')
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:48:08 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x20000000800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  291.816527] FAULT_INJECTION: forcing a failure.
[  291.816527] name failslab, interval 1, probability 0, space 0, times 0
[  291.843065] FAULT_INJECTION: forcing a failure.
[  291.843065] name failslab, interval 1, probability 0, space 0, times 0
05:48:08 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f, 0x0, 0x0, 0x68dc0d2c}, 0x0, 0x0, 0xffffffffffffffff, 0xb)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz1\x00', 0x1ff)
r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x101080, 0x0)
ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000200))
getresgid(&(0x7f0000000080)=<r1=>0x0, &(0x7f0000000180), &(0x7f00000001c0))
r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x18001, 0x0)
recvmsg$can_bcm(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000005c0)=""/32, 0x20}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/74, 0x4a}], 0x4, &(0x7f0000001700)=""/63, 0x3f}, 0x0)
setfsgid(r1)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = fcntl$dupfd(r3, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x4, 0xd05040)
pipe(&(0x7f0000000500)={<r6=>0xffffffffffffffff})
ioctl$sock_inet_SIOCSIFBRDADDR(r6, 0x891a, &(0x7f0000001780)={'wg0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}})
dup2(r6, r5)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
r8 = fcntl$dupfd(r7, 0x0, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
setsockopt$inet6_dccp_buf(r8, 0x21, 0xe, &(0x7f0000000280)="91bf9ec640790a8b7ce0f1c46377832af298bbdf29b2c8b8d5da902541cda4959c0c326a54f1f818041a3482ff03d49d3ac4874322d6f72e4d84461120f107c0e17527e7669e13f60673c5a8f01a76efe3411d8a1d3c02baab3dfd4659b4", 0x5e)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=@newae={0x104, 0x1e, 0x300, 0x70bd28, 0x25dfdbff, {{@in=@multicast1, 0x4d2, 0xd848272c62767c94, 0x3c}, @in6=@mcast2, 0x3, 0x3506}, [@encap={0x1c, 0x4, {0x3, 0x4e22, 0x4e23, @in=@broadcast}}, @lifetime_val={0x24, 0x9, {0x20, 0xffffffffffffffe0, 0x3aac4c62, 0x2}}, @algo_comp={0x6d, 0x3, {{'deflate\x00'}, 0x128, "04b23ba9df954462f3ed9d17f1c8e6967f6a7f9f3c3e2c13c411c17370d1615c08f2cce91d"}}, @srcaddr={0x14, 0xd, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x104}, 0x1, 0x0, 0x0, 0x2004c054}, 0x814)

[  291.880675] CPU: 0 PID: 12228 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  291.888619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  291.897969] Call Trace:
[  291.900568]  dump_stack+0x13e/0x194
[  291.904208]  should_fail.cold+0x10a/0x14b
[  291.908364]  should_failslab+0xd6/0x130
[  291.912339]  kmem_cache_alloc+0x44/0x770
[  291.916408]  ? rcu_read_lock_sched_held+0x10a/0x130
[  291.921432]  ? mempool_free+0x1d0/0x1d0
[  291.925414]  mempool_alloc+0x111/0x2d0
[  291.929300]  ? remove_element.isra.0+0x1b0/0x1b0
[  291.934050]  ? remove_element.isra.0+0x1b0/0x1b0
[  291.938794]  ? __lock_acquire+0x5f7/0x4620
[  291.943021]  bvec_alloc+0xcc/0x2d0
[  291.946552]  bio_alloc_bioset+0x3fa/0x640
[  291.950685]  ? bvec_alloc+0x2d0/0x2d0
[  291.954475]  ? __lock_acquire+0x5f7/0x4620
[  291.958696]  mpage_alloc.isra.0+0x5b/0x2a0
[  291.962917]  __mpage_writepage+0xd5d/0x1220
[  291.967226]  ? trace_hardirqs_on+0x10/0x10
[  291.971463]  ? clean_buffers+0x1d0/0x1d0
[  291.975531]  ? find_held_lock+0x2d/0x110
[  291.979588]  ? clear_page_dirty_for_io+0x347/0x7e0
[  291.984512]  ? save_trace+0x290/0x290
[  291.988300]  ? __lock_is_held+0xad/0x140
[  291.992355]  write_cache_pages+0x411/0xd60
[  291.996582]  ? clean_buffers+0x1d0/0x1d0
[  292.000634]  ? clear_page_dirty_for_io+0x7e0/0x7e0
[  292.005554]  ? memset+0x20/0x40
[  292.008853]  ? save_trace+0x290/0x290
[  292.012645]  ? __lock_acquire+0x5f7/0x4620
[  292.016868]  ? fat_add_cluster+0xc0/0xc0
[  292.020915]  mpage_writepages+0xc8/0x200
[  292.024959]  ? mpage_end_io+0x1a0/0x1a0
[  292.028916]  ? fat_add_cluster+0xc0/0xc0
[  292.032961]  ? save_trace+0x290/0x290
[  292.036748]  ? find_held_lock+0x2d/0x110
[  292.040794]  ? fat_readpages+0x30/0x30
[  292.044663]  do_writepages+0xd0/0x250
[  292.048448]  ? block_write_end+0x42/0xf0
[  292.052502]  ? page_writeback_cpu_online+0x10/0x10
[  292.057417]  ? lock_acquire+0x170/0x3f0
[  292.061373]  ? do_raw_spin_unlock+0x164/0x250
[  292.065855]  ? _raw_spin_unlock+0x29/0x40
[  292.069994]  ? wbc_attach_and_unlock_inode+0x5bb/0x8e0
[  292.075275]  __filemap_fdatawrite_range+0x236/0x310
[  292.080304]  ? replace_page_cache_page+0x6f0/0x6f0
[  292.085228]  ? generic_file_direct_write+0x2fa/0x420
[  292.090327]  filemap_write_and_wait_range+0x39/0xb0
[  292.095332]  __generic_file_write_iter+0x456/0x590
[  292.100254]  generic_file_write_iter+0x2fa/0x650
[  292.105008]  __vfs_write+0x44e/0x630
[  292.108715]  ? kernel_read+0x110/0x110
[  292.112594]  ? rcu_read_lock_sched_held+0x10a/0x130
[  292.117602]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  292.122340]  vfs_write+0x192/0x4e0
[  292.125879]  SyS_write+0xf2/0x210
[  292.129333]  ? SyS_read+0x210/0x210
[  292.132957]  ? SyS_clock_settime+0x1a0/0x1a0
[  292.137361]  ? do_syscall_64+0x4c/0x640
[  292.141319]  ? SyS_read+0x210/0x210
[  292.144932]  do_syscall_64+0x1d5/0x640
[  292.148807]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  292.153982] RIP: 0033:0x45c479
[  292.157154] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  292.164858] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  292.172119] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  292.179389] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  292.186654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  292.193910] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 000000000000000a
[  292.201183] CPU: 1 PID: 12242 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  292.209086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  292.218425] Call Trace:
[  292.221003]  dump_stack+0x13e/0x194
[  292.224614]  should_fail.cold+0x10a/0x14b
[  292.228758]  ? rpc_i_callback+0x20/0x20
[  292.232713]  should_failslab+0xd6/0x130
[  292.236671]  ? rpc_i_callback+0x20/0x20
[  292.240627]  kmem_cache_alloc+0x2b5/0x770
[  292.244758]  ? find_held_lock+0x2d/0x110
[  292.248799]  ? rpc_fill_super+0x185/0x8e0
[  292.252929]  ? rpc_i_callback+0x20/0x20
[  292.256884]  ? rpc_pipe_release+0x800/0x800
[  292.261196]  alloc_inode+0x5d/0x170
[  292.264805]  new_inode_pseudo+0x14/0xe0
[  292.268760]  new_inode+0x1b/0x40
[  292.272124]  rpc_get_inode+0x1d/0x1f0
[  292.275919]  rpc_fill_super+0x2ca/0x8e0
[  292.279901]  ? sget_userns+0x768/0xc30
[  292.283774]  ? get_empty_filp.cold+0x47/0x47
[  292.288162]  ? rpc_pipe_release+0x800/0x800
[  292.292466]  ? set_anon_super+0x20/0x20
[  292.296428]  ? rpc_pipe_release+0x800/0x800
[  292.300732]  mount_ns+0xdc/0x180
[  292.304085]  mount_fs+0x92/0x2a0
[  292.307439]  vfs_kern_mount.part.0+0x5b/0x3c0
[  292.311920]  do_mount+0x3c9/0x24f0
[  292.315457]  ? copy_mount_string+0x40/0x40
[  292.319684]  ? __might_fault+0x177/0x1b0
[  292.323728]  ? _copy_from_user+0x94/0x100
[  292.327856]  ? memdup_user+0x54/0xa0
[  292.331550]  ? copy_mount_options+0x1ec/0x2e0
[  292.336026]  ? copy_mnt_ns+0x8a0/0x8a0
[  292.339894]  SyS_mount+0xa8/0x120
[  292.343345]  ? copy_mnt_ns+0x8a0/0x8a0
[  292.347230]  do_syscall_64+0x1d5/0x640
[  292.351122]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  292.356299] RIP: 0033:0x45c479
[  292.359474] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  292.367164] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  292.374421] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
05:48:08 executing program 4:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)
r1 = fcntl$getown(r0, 0x9)
r2 = gettid()
setpgid(r1, r2)

[  292.381674] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  292.388926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  292.396187] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000009
05:48:08 executing program 5 (fault-call:7 fault-nth:11):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

05:48:08 executing program 0 (fault-call:3 fault-nth:9):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

05:48:08 executing program 2:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2)
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x101000, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000001c0)={0x1, 0x1, {0xffffffffffffffff, 0x1, 0x9, 0x1}, 0x3})
ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000100)={0xffff, [0x1, 0x40, 0x3, 0x2, 0x7, 0x3, 0x54, 0x8001, 0x7, 0x4, 0x7, 0x101, 0x7, 0x9, 0x6, 0x7, 0x5, 0x8, 0x7ff, 0x63fd, 0x8000, 0x9, 0x5, 0x20, 0xff01, 0x9, 0x4, 0x8, 0x101, 0x7f, 0x313e, 0x20, 0x2, 0xf0, 0x40, 0x9, 0x6, 0x1000, 0xfffd, 0x8000, 0x7, 0x40, 0xe6, 0x5, 0x3, 0x4, 0xb4, 0x7], 0x7})
socket$tipc(0x1e, 0x2, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

[  292.553977] FAULT_INJECTION: forcing a failure.
[  292.553977] name failslab, interval 1, probability 0, space 0, times 0
[  292.562004] FAULT_INJECTION: forcing a failure.
[  292.562004] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  292.577002] CPU: 1 PID: 12263 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0
[  292.584891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  292.594253] Call Trace:
[  292.596844]  dump_stack+0x13e/0x194
[  292.600469]  should_fail.cold+0x10a/0x14b
[  292.604602]  __alloc_pages_nodemask+0x1bf/0x700
[  292.609258]  ? save_trace+0x290/0x290
[  292.613042]  ? __alloc_pages_slowpath+0x26c0/0x26c0
[  292.618061]  ? save_trace+0x290/0x290
[  292.621848]  cache_grow_begin+0x7b/0x410
[  292.625903]  kmem_cache_alloc+0x695/0x770
[  292.630042]  ? rcu_read_lock_sched_held+0x10a/0x130
[  292.635054]  ? mempool_free+0x1d0/0x1d0
[  292.639019]  mempool_alloc+0x111/0x2d0
[  292.642909]  ? remove_element.isra.0+0x1b0/0x1b0
[  292.647650]  ? remove_element.isra.0+0x1b0/0x1b0
[  292.652390]  ? __lock_acquire+0x5f7/0x4620
[  292.656612]  bvec_alloc+0xcc/0x2d0
[  292.660152]  bio_alloc_bioset+0x3fa/0x640
[  292.664297]  ? bvec_alloc+0x2d0/0x2d0
[  292.668096]  ? __lock_acquire+0x5f7/0x4620
[  292.672348]  mpage_alloc.isra.0+0x5b/0x2a0
[  292.676591]  __mpage_writepage+0xd5d/0x1220
[  292.680904]  ? trace_hardirqs_on+0x10/0x10
[  292.685154]  ? clean_buffers+0x1d0/0x1d0
[  292.689207]  ? find_held_lock+0x2d/0x110
[  292.693258]  ? clear_page_dirty_for_io+0x347/0x7e0
[  292.698175]  ? save_trace+0x290/0x290
[  292.701988]  ? __lock_is_held+0xad/0x140
[  292.706050]  write_cache_pages+0x411/0xd60
[  292.710286]  ? clean_buffers+0x1d0/0x1d0
[  292.714346]  ? clear_page_dirty_for_io+0x7e0/0x7e0
[  292.719262]  ? memset+0x20/0x40
[  292.722536]  ? save_trace+0x290/0x290
[  292.726329]  ? __lock_acquire+0x5f7/0x4620
[  292.730551]  ? fat_add_cluster+0xc0/0xc0
[  292.734595]  mpage_writepages+0xc8/0x200
[  292.738758]  ? mpage_end_io+0x1a0/0x1a0
[  292.742718]  ? fat_add_cluster+0xc0/0xc0
[  292.746765]  ? save_trace+0x290/0x290
[  292.750565]  ? find_held_lock+0x2d/0x110
[  292.754617]  ? fat_readpages+0x30/0x30
[  292.758496]  do_writepages+0xd0/0x250
[  292.762285]  ? block_write_end+0x42/0xf0
[  292.766335]  ? page_writeback_cpu_online+0x10/0x10
[  292.771254]  ? lock_acquire+0x170/0x3f0
[  292.775223]  ? do_raw_spin_unlock+0x164/0x250
[  292.779708]  ? _raw_spin_unlock+0x29/0x40
[  292.783840]  ? wbc_attach_and_unlock_inode+0x5bb/0x8e0
[  292.789104]  __filemap_fdatawrite_range+0x236/0x310
[  292.794104]  ? replace_page_cache_page+0x6f0/0x6f0
[  292.799034]  ? generic_file_direct_write+0x2fa/0x420
[  292.804123]  filemap_write_and_wait_range+0x39/0xb0
[  292.809125]  __generic_file_write_iter+0x456/0x590
[  292.814039]  generic_file_write_iter+0x2fa/0x650
[  292.818795]  __vfs_write+0x44e/0x630
[  292.822509]  ? kernel_read+0x110/0x110
[  292.826392]  ? rcu_read_lock_sched_held+0x10a/0x130
[  292.831392]  ? rcu_sync_lockdep_assert+0x69/0xa0
[  292.836133]  vfs_write+0x192/0x4e0
[  292.839655]  SyS_write+0xf2/0x210
[  292.843092]  ? SyS_read+0x210/0x210
[  292.846708]  ? SyS_clock_settime+0x1a0/0x1a0
[  292.851110]  ? do_syscall_64+0x4c/0x640
[  292.855081]  ? SyS_read+0x210/0x210
[  292.858697]  do_syscall_64+0x1d5/0x640
[  292.862584]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  292.867768] RIP: 0033:0x45c479
[  292.870947] RSP: 002b:00007ff3dc92bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  292.878664] RAX: ffffffffffffffda RBX: 00007ff3dc92c6d4 RCX: 000000000045c479
[  292.885924] RDX: 0000000000000001 RSI: 0000000020001400 RDI: 0000000000000006
[  292.893184] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
[  292.900459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[  292.907714] R13: 0000000000000c4d R14: 00000000004ce2cc R15: 000000000000000b
[  292.914984] CPU: 0 PID: 12262 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  292.922879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  292.932218] Call Trace:
[  292.934795]  dump_stack+0x13e/0x194
[  292.938408]  should_fail.cold+0x10a/0x14b
[  292.942545]  should_failslab+0xd6/0x130
[  292.946505]  __kmalloc+0x2e9/0x7c0
[  292.950031]  ? register_shrinker+0xb8/0x210
[  292.954339]  ? lock_downgrade+0x6e0/0x6e0
[  292.958475]  register_shrinker+0xb8/0x210
[  292.962609]  sget_userns+0x9c5/0xc30
[  292.966303]  ? get_empty_filp.cold+0x47/0x47
[  292.970707]  ? set_anon_super+0x20/0x20
[  292.974663]  ? rpc_pipe_release+0x800/0x800
[  292.978967]  mount_ns+0x65/0x180
[  292.982318]  mount_fs+0x92/0x2a0
[  292.985792]  vfs_kern_mount.part.0+0x5b/0x3c0
[  292.990291]  do_mount+0x3c9/0x24f0
[  292.993819]  ? copy_mount_string+0x40/0x40
[  292.998037]  ? __might_fault+0x177/0x1b0
[  293.002092]  ? _copy_from_user+0x94/0x100
[  293.006235]  ? memdup_user+0x54/0xa0
[  293.009938]  ? copy_mount_options+0x1ec/0x2e0
[  293.014433]  ? copy_mnt_ns+0x8a0/0x8a0
[  293.018307]  SyS_mount+0xa8/0x120
[  293.021743]  ? copy_mnt_ns+0x8a0/0x8a0
[  293.025632]  do_syscall_64+0x1d5/0x640
[  293.029509]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  293.034680] RIP: 0033:0x45c479
[  293.037851] RSP: 002b:00007f0dcb1efc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  293.045568] RAX: ffffffffffffffda RBX: 00007f0dcb1f06d4 RCX: 000000000045c479
05:48:09 executing program 3 (fault-call:3 fault-nth:10):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  293.052837] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  293.060096] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
[  293.067351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  293.074607] R13: 000000000000074a R14: 00000000004c9d34 R15: 0000000000000009
05:48:09 executing program 1:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)
umount2(&(0x7f0000000040)='./file0\x00', 0x0)

05:48:09 executing program 5 (fault-call:7 fault-nth:12):
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0)
write$9p(r3, &(0x7f0000001400)=';', 0x1)

[  293.171886] FAULT_INJECTION: forcing a failure.
[  293.171886] name failslab, interval 1, probability 0, space 0, times 0
[  293.183590] CPU: 1 PID: 12279 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0
[  293.191484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  293.200842] Call Trace:
[  293.203442]  dump_stack+0x13e/0x194
[  293.207088]  should_fail.cold+0x10a/0x14b
[  293.211248]  should_failslab+0xd6/0x130
[  293.215211]  kmem_cache_alloc+0x2b5/0x770
[  293.219348]  ? alloc_inode+0x5d/0x170
[  293.223135]  selinux_inode_alloc_security+0xb1/0x2a0
[  293.228238]  security_inode_alloc+0x8f/0xd0
[  293.232552]  inode_init_always+0x549/0xaf0
[  293.236787]  ? rpc_pipe_release+0x800/0x800
[  293.241109]  alloc_inode+0x7a/0x170
[  293.244734]  new_inode_pseudo+0x14/0xe0
[  293.248706]  new_inode+0x1b/0x40
[  293.252070]  rpc_get_inode+0x1d/0x1f0
[  293.255864]  rpc_fill_super+0x2ca/0x8e0
[  293.259833]  ? sget_userns+0x768/0xc30
[  293.263702]  ? get_empty_filp.cold+0x47/0x47
[  293.268104]  ? rpc_pipe_release+0x800/0x800
[  293.272414]  ? set_anon_super+0x20/0x20
[  293.276391]  ? rpc_pipe_release+0x800/0x800
[  293.280701]  mount_ns+0xdc/0x180
[  293.284053]  mount_fs+0x92/0x2a0
[  293.287407]  vfs_kern_mount.part.0+0x5b/0x3c0
[  293.291899]  do_mount+0x3c9/0x24f0
[  293.295438]  ? copy_mount_string+0x40/0x40
[  293.299668]  ? __might_fault+0x177/0x1b0
[  293.303809]  ? _copy_from_user+0x94/0x100
[  293.307950]  ? memdup_user+0x54/0xa0
[  293.311648]  ? copy_mount_options+0x1ec/0x2e0
[  293.316138]  ? copy_mnt_ns+0x8a0/0x8a0
[  293.320045]  SyS_mount+0xa8/0x120
[  293.323575]  ? copy_mnt_ns+0x8a0/0x8a0
[  293.327460]  do_syscall_64+0x1d5/0x640
[  293.331348]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  293.336528] RIP: 0033:0x45c479
[  293.339804] RSP: 002b:00007f66cccffc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
[  293.347612] RAX: ffffffffffffffda RBX: 00007f66ccd006d4 RCX: 000000000045c479
[  293.354875] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 0000000000000000
[  293.362144] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
05:48:09 executing program 0 (fault-call:3 fault-nth:10):
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0)

[  293.369427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  293.376702] R13: 000000000000074a R14: 00000000004c9d34 R15: 000000000000000a
[  293.403305] list_add double add: new=ffff888057240120, prev=ffffffff886d9800, next=ffff888057240120.
[  293.412952] ------------[ cut here ]------------
[  293.417710] kernel BUG at lib/list_debug.c:29!
[  293.422300] invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[  293.427648] Modules linked in:
[  293.430822] CPU: 1 PID: 7476 Comm: syz-executor.0 Not tainted 4.14.172-syzkaller #0
[  293.438598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  293.447978] task: ffff888058f5a000 task.stack: ffff888058f80000
[  293.454019] RIP: 0010:__list_add_valid.cold+0x26/0x3c
[  293.459189] RSP: 0018:ffff888058f87c70 EFLAGS: 00010086
[  293.464536] RAX: 0000000000000058 RBX: ffff8880572400c0 RCX: 0000000000000000
[  293.471788] RDX: 0000000000000000 RSI: ffffffff86ac0860 RDI: ffffed100b1f0f84
[  293.479034] RBP: ffff888057240120 R08: 0000000000000058 R09: 0000000000000002
[  293.486287] R10: ffff888058f5a8d0 R11: ffff888058f5a000 R12: ffff888057240120
[  293.493541] R13: ffff888057240120 R14: ffff88804e69f588 R15: ffffffff8b03ebe0
[  293.500790] FS:  0000000002216940(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
[  293.509025] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  293.514889] CR2: 000000000071a158 CR3: 0000000058e4b000 CR4: 00000000001406e0
[  293.522144] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  293.529392] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  293.536677] Call Trace:
[  293.539279]  ? __put_net+0x1e/0x100
[  293.542888]  __put_net+0x3a/0x100
[  293.546335]  __sk_destruct+0x508/0x640
[  293.550204]  sk_destruct+0x97/0xc0
[  293.553726]  __sk_free+0x4c/0x220
[  293.557155]  sk_free+0x2b/0x40
[  293.560339]  tcp_close+0x9d5/0xf30
[  293.563903]  inet_release+0xdf/0x1b0
[  293.567629]  __sock_release+0xcd/0x2b0
[  293.571496]  ? __sock_release+0x2b0/0x2b0
[  293.575618]  sock_close+0x15/0x20
[  293.579109]  __fput+0x25f/0x790
[  293.582450]  task_work_run+0x113/0x190
[  293.586332]  exit_to_usermode_loop+0x1d6/0x220
[  293.590895]  do_syscall_64+0x4a3/0x640
[  293.594764]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  293.599930] RIP: 0033:0x415ff0
[  293.603135] RSP: 002b:00007ffea94fe798 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  293.610821] RAX: 0000000000000000 RBX: 00007ffea94fe8a0 RCX: 0000000000415ff0
[  293.618068] RDX: 00000000000000e0 RSI: 00007ffea94fec80 RDI: 0000000000000003
[  293.625315] RBP: 0000000000000003 R08: 0000000000006000 R09: 0000000000004000
[  293.632562] R10: 00007ffea94fe8a0 R11: 0000000000000246 R12: 0000000000000000
[  293.639807] R13: 00007ffea94fef20 R14: 0000000000047687 R15: 00007ffea94fef30
[  293.647087] Code: e9 57 ff ff ff 4c 89 e1 48 c7 c7 c0 54 e4 86 e8 5d 0c 4b fe 0f 0b 48 89 f2 4c 89 e1 48 89 ee 48 c7 c7 00 56 e4 86 e8 46 0c 4b fe <0f> 0b 48 89 f1 48 c7 c7 80 55 e4 86 4c 89 e6 e8 32 0c 4b fe 0f 
[  293.666152] RIP: __list_add_valid.cold+0x26/0x3c RSP: ffff888058f87c70
[  293.672797] ---[ end trace 931648f111dfc02f ]---
[  293.677526] Kernel panic - not syncing: Fatal exception
[  293.684082] Kernel Offset: disabled
[  293.687700] Rebooting in 86400 seconds..