[info] Using makefile-style concurrent boot in runlevel 2. [ 27.060622] audit: type=1800 audit(1545605246.898:21): pid=5889 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 39.500426] sshd (6031) used greatest stack depth: 15728 bytes left Warning: Permanently added '10.128.0.124' (ECDSA) to the list of known hosts. 2018/12/23 22:47:45 fuzzer started 2018/12/23 22:47:47 dialing manager at 10.128.0.26:33943 2018/12/23 22:47:48 syscalls: 1 2018/12/23 22:47:48 code coverage: enabled 2018/12/23 22:47:48 comparison tracing: enabled 2018/12/23 22:47:48 setuid sandbox: enabled 2018/12/23 22:47:48 namespace sandbox: enabled 2018/12/23 22:47:48 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/23 22:47:48 fault injection: enabled 2018/12/23 22:47:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/23 22:47:48 net packet injection: enabled 2018/12/23 22:47:48 net device setup: enabled 22:50:10 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 190.275944] IPVS: ftp: loaded support on port[0] = 21 22:50:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000040)={0xa}, 0x4) [ 190.573398] IPVS: ftp: loaded support on port[0] = 21 22:50:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0xfe4d) r2 = socket$inet6(0xa, 0x803, 0x1f) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") recvmmsg(r1, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000500)=""/192, 0xc0}, {&(0x7f00000005c0)=""/229, 0xe5}], 0x2}}], 0x1, 0x0, 0x0) 22:50:10 executing program 3: clone(0x10000004007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'oq0\x01\x00\x00\x00\x00\b\x10\x12:\t\xff\xff\b', 0x401132}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'dummy0\x00', 0x400}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) [ 190.949369] IPVS: ftp: loaded support on port[0] = 21 [ 191.107823] IPVS: ftp: loaded support on port[0] = 21 22:50:11 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'bpq0\x00', 0x200}) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x1, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x2, 0x3, 0x1, 0x7, 0xfffffffffffffffc, 0xffffffffffffffff}], 0x0, 0x9, 0x4, &(0x7f0000000140)=""/4, 0x0, 0x1}, 0x48) [ 191.700338] IPVS: ftp: loaded support on port[0] = 21 22:50:11 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) [ 192.209847] IPVS: ftp: loaded support on port[0] = 21 [ 192.249208] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.265392] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.274032] device bridge_slave_0 entered promiscuous mode [ 192.401254] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.412365] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.420362] device bridge_slave_1 entered promiscuous mode [ 192.539398] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 192.691452] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.697838] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.708688] device bridge_slave_0 entered promiscuous mode [ 192.717766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 192.875299] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.881865] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.889297] device bridge_slave_1 entered promiscuous mode [ 193.001910] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.154044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 193.170906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.297803] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.305259] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.313345] device bridge_slave_0 entered promiscuous mode [ 193.325221] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.388514] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.397669] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.407835] device bridge_slave_0 entered promiscuous mode [ 193.430970] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.437330] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.447533] device bridge_slave_1 entered promiscuous mode [ 193.539843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.552603] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.583904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.592193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.611999] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.618356] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.660041] device bridge_slave_1 entered promiscuous mode [ 193.693045] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.709630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 193.806356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.832789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.866903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.956228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 193.987042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.995218] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 194.011123] team0: Port device team_slave_0 added [ 194.016713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.144791] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.172965] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 194.196557] team0: Port device team_slave_1 added [ 194.205822] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.218241] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.226545] device bridge_slave_0 entered promiscuous mode [ 194.276326] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.370668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.379198] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.389847] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.400335] device bridge_slave_1 entered promiscuous mode [ 194.420660] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 194.432219] team0: Port device team_slave_0 added [ 194.443016] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.472489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.532762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.549530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 194.563183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.597020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.612320] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 194.619939] team0: Port device team_slave_1 added [ 194.628012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 194.637490] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.644270] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.661226] device bridge_slave_0 entered promiscuous mode [ 194.670595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 194.688560] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.701045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.758179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 194.778605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.793259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.811060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 194.824014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 194.836563] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.850191] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.857615] device bridge_slave_1 entered promiscuous mode [ 194.884002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.900580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.910426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.921558] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 194.960098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.968603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 194.991591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.020827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.039941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.048264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 195.065320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.076753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.104659] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.121025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.128423] team0: Port device team_slave_0 added [ 195.166428] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.189126] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.241265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.270293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.286768] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.334272] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.362423] team0: Port device team_slave_1 added [ 195.418605] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.483959] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.503355] team0: Port device team_slave_0 added [ 195.545522] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.625744] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.641557] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 195.650444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.660244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.720570] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.738636] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.750709] team0: Port device team_slave_1 added [ 195.764346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.784651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.794839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.891581] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 195.899896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.907829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.931165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 195.946124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.012124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 196.019022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.040637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.059298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 196.079801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.110441] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 196.117835] team0: Port device team_slave_0 added [ 196.159757] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 196.167760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.182814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.233831] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 196.249398] team0: Port device team_slave_1 added [ 196.310484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 196.318012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.342318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.377070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.514164] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.520689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.527616] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.534045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.558703] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 196.567223] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 196.582920] team0: Port device team_slave_0 added [ 196.607324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.641232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.696114] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.702523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.709203] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.715665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.729960] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 196.736574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 196.755994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.771788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.814424] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 196.823121] team0: Port device team_slave_1 added [ 196.866701] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 196.880918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.888840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.974156] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 196.998211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.021216] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.098626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.110540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.120604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.262726] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 197.270115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.278158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.382900] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 197.404738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.419218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.574798] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.581253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.587941] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.594364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.603507] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 197.612454] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.618816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.625565] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.632035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.642004] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 197.654264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.666929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.680998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.558467] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.564939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.571669] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.578037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.594712] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 198.660294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.955120] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.961571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.968255] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.974680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.982958] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.729984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.757436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.141475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.269604] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 202.544200] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 202.709563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 202.726046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.746172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.775316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.982208] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 202.989580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.001421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.048693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.171985] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.314742] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 203.490366] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.506701] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 203.724442] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 203.744844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.754817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.927427] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 203.934207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.949643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.111113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.240711] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.370576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.381658] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.657920] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 204.806348] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.142804] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.149518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.175730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.326594] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.340992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.348062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.656643] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.790663] 8021q: adding VLAN 0 to HW filter on device team0 22:50:26 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x80000000000001b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xc, 0x7fffffff, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 22:50:26 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR, @ANYRES32, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64]], @ANYRESDEC, @ANYRES16], 0x1e) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='nv\x00', 0x3) socket(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$inet(0x2, 0x804, 0xe0b) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xd1, &(0x7f0000000180), 0x4) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xcb, &(0x7f0000000000), 0xc) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f00000002c0)) renameat(r0, &(0x7f00000003c0)='./bus\x00', r0, &(0x7f0000000580)='./file0\x00') write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000000c0)=0x500, 0x8080fffffffe) geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getegid() [ 206.532214] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.557956] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.600122] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.625910] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.644962] hrtimer: interrupt took 45038 ns [ 206.653125] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.673798] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.694414] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.724986] kauditd_printk_skb: 9 callbacks suppressed [ 206.725000] audit: type=1804 audit(1545605426.558:31): pid=7513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir039264963/syzkaller.x9O5P4/2/file0/file0" dev="sda1" ino=16524 res=1 [ 206.741494] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 22:50:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000000)=0x40020240, 0x10000) [ 206.869800] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.882205] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.888907] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 206.921910] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 22:50:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x25, 0x0, &(0x7f0000000100)="5834e2dfa45a28157d1313808f7a386d21aed7f5afb0b60beb8f0d10093fdb97ea88dbb8b4", 0x0, 0x4}, 0x28) 22:50:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') mount(&(0x7f0000000140)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4) setpriority(0x2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) perf_event_open(0x0, 0x0, 0xd, r0, 0x0) 22:50:27 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x400002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd4(r0, 0x0, 0x0, 0x80800) ioctl$TIOCSSOFTCAR(r0, 0x40096101, &(0x7f0000000000)=0x1000000000000) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 207.224971] overlayfs: failed to resolve './file1': -2 [ 207.252569] QAT: Device 0 not found 22:50:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) [ 207.288089] QAT: Device 0 not found 22:50:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x14) utime(&(0x7f0000000240)='./bus\x00', &(0x7f0000000100)={0xffffffefffff8001}) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) [ 207.422341] overlayfs: failed to resolve './file1': -2 22:50:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:50:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, 0x0) memfd_create(&(0x7f00000002c0)='%[md5sum#\x00', 0x1000007) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) [ 207.868068] syz-executor3 (7643) used obsolete PPPIOCDETACH ioctl 22:50:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x0, 0x4}}, 0x28) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) 22:50:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x1002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) dup(0xffffffffffffffff) open(0x0, 0x20141041, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), 0x0) getgroups(0x6, &(0x7f0000000540)=[0x0, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0xee01]) fstat(r0, 0x0) fstat(0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000000880)=[0x0, 0x0, 0x0]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in6=@ipv4={[], [], @remote}}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0x0) getresgid(&(0x7f0000000780), &(0x7f00000007c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000640)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r3, &(0x7f0000000080), 0x0}, 0x18) 22:50:28 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0xfdfdffff00000000, &(0x7f0000000000)='7'}) 22:50:28 executing program 5: mkdir(0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20000000) get_robust_list(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x13, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, 'sh\x00'}, 0x2c) creat(0x0, 0xa) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) stat(0x0, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) 22:50:28 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'bpq0\x00', 0x200}) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x1, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x2, 0x3, 0x1, 0x7, 0xfffffffffffffffc, 0xffffffffffffffff}], 0x0, 0x9, 0x4, &(0x7f0000000140)=""/4, 0x0, 0x1}, 0x48) [ 208.636938] binder: 7705:7707 transaction failed 29189/-22, size 0-0 line 2850 [ 208.663350] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 208.680175] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 208.696130] binder: 7705:7707 ioctl c0306201 200000c0 returned -14 [ 208.707334] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 22:50:28 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'bpq0\x00', 0x200}) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x0, &(0x7f0000000080), 0x0, 0x9, 0x4, &(0x7f0000000140)=""/4}, 0x48) 22:50:28 executing program 5: mkdir(0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20000000) get_robust_list(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x13, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, 'sh\x00'}, 0x2c) creat(0x0, 0xa) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) stat(0x0, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) [ 208.743553] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 208.766056] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 208.782164] ISOFS: Unable to identify CD-ROM format. 22:50:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) unshare(0x400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 208.810281] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 208.849269] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 208.887126] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 208.919487] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 22:50:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x40, 0x0) mount(0x0, &(0x7f000000fff8)='./file0\x00', 0x0, 0x7ffbf, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00U\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0]) [ 208.973628] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 208.997108] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 209.055286] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:29 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'bpq0\x00', 0x200}) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x1, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x2, 0x3, 0x1, 0x7, 0xfffffffffffffffc, 0xffffffffffffffff}], 0x0, 0x9, 0x4, &(0x7f0000000140)=""/4, 0x0, 0x1}, 0x48) [ 209.202700] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 209.209457] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 209.251459] ISOFS: Unable to identify CD-ROM format. 22:50:29 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000340)={0x15, 0x23d, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote}, @ib={0x1b, 0x0, 0x0, {"02d0a097398f4ba2cc37e5375879dfb3"}}}}, 0x118) [ 209.272199] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 209.285539] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 22:50:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0}) [ 209.349739] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 209.356439] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 209.415805] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 209.439047] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 209.461363] binder: 7758:7759 ioctl c018620c 200000c0 returned -1 [ 209.473125] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 209.516083] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x0, 0x4}}, 0x28) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) 22:50:29 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) setpriority(0x2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x0, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0xffffffffffffffb4, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0x0, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, r0, 0x2) 22:50:29 executing program 5: perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x4) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/bnep\x00') ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000140)={0x53, 0x410000400, 0xff, 0x4}) socket$inet6(0xa, 0xffffffffffffffff, 0xa) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) syz_open_dev$evdev(&(0x7f00000005c0)='/dev/input/event#\x00', 0x0, 0x400000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x3fc, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, 0x0, 0x3}, 0x9c) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000040)) r2 = socket(0x40000000015, 0x5, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000001c0)=0x800000000000002, 0x4) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000280)=0x1, 0xfe8c) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) 22:50:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:50:29 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'bpq0\x00', 0x200}) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x1, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x2, 0x3, 0x1, 0x7, 0xfffffffffffffffc, 0xffffffffffffffff}], 0x0, 0x9, 0x4, &(0x7f0000000140)=""/4, 0x0, 0x1}, 0x48) [ 209.765653] hfsplus: unable to find HFS+ superblock [ 209.789624] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 209.811065] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 209.847650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 209.858378] ISOFS: Unable to identify CD-ROM format. [ 209.879113] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 209.889419] overlayfs: failed to resolve './file1': -2 [ 209.927111] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 209.946121] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:50:29 executing program 3: syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0090004000000000000c0000000200000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d01", 0x58}]) 22:50:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0bc5310, &(0x7f0000000000)={{}, 'port0\x00'}) [ 209.989144] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 22:50:29 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x10a000d04) [ 210.033496] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:50:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) [ 210.077546] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 210.118053] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 210.159801] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 210.190866] loop3: [POWERTEC] p1 p2 p3 [ 210.192422] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:50:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0bc5310, &(0x7f0000000000)={{}, 'port0\x00'}) 22:50:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') recvfrom$inet(r2, &(0x7f0000000340)=""/81, 0x51, 0x0, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) sendfile(r1, r2, &(0x7f0000000040), 0x10000000000443) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) init_module(0x0, 0x0, &(0x7f0000000940)='/security}vmnet1keyring)self/\x00') fdatasync(0xffffffffffffffff) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000480), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000700)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xcb, "0234d4", "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"}}, 0x110) mq_open(&(0x7f0000000680)='trusted.overlay.redirect\x00', 0xc0, 0x0, &(0x7f0000000840)={0x0, 0x9, 0x0, 0x100, 0x0, 0x8, 0x200, 0x51b}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x7}, 0x28, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) syz_open_dev$vbi(&(0x7f00000008c0)='/dev/vbi#\x00', 0x2, 0x2) [ 210.210379] overlayfs: failed to resolve './file1': -2 [ 210.221887] loop3: p2 size 6553600 extends beyond EOD, truncated [ 210.229941] loop3: p3 start 82837517 is beyond EOD, truncated [ 210.239050] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:30 executing program 3: mknod(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x44, 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00c462913878fe3e0f1110c442019dccd3196f") execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x1ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132441) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000003c0), 0x8) [ 210.400828] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 210.418398] ISOFS: Unable to identify CD-ROM format. 22:50:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x0, 0x4}}, 0x28) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) 22:50:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000006e80)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006d80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000004fc0)=[{0x10}], 0x10}}], 0x1, 0x4000800) 22:50:30 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) [ 210.632832] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 210.647638] print_req_error: I/O error, dev loop3, sector 3072 flags 80700 [ 210.655166] print_req_error: I/O error, dev loop3, sector 263974 flags 80700 [ 210.668411] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 210.672818] print_req_error: I/O error, dev loop3, sector 3072 flags 0 [ 210.682052] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 210.690279] print_req_error: I/O error, dev loop3, sector 3072 flags 0 [ 210.697068] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 210.706555] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 210.706565] print_req_error: I/O error, dev loop3, sector 3072 flags 0 [ 210.706583] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 210.728273] print_req_error: I/O error, dev loop3, sector 263974 flags 0 [ 210.735215] Buffer I/O error on dev loop3p2, logical block 99200, async page read [ 210.743158] print_req_error: I/O error, dev loop3, sector 263976 flags 0 [ 210.746600] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 210.750126] Buffer I/O error on dev loop3p2, logical block 99201, async page read [ 210.750170] print_req_error: I/O error, dev loop3, sector 263978 flags 0 [ 210.750188] Buffer I/O error on dev loop3p2, logical block 99202, async page read [ 210.750224] print_req_error: I/O error, dev loop3, sector 263980 flags 0 [ 210.764832] Buffer I/O error on dev loop3p2, logical block 99203, async page read [ 210.782633] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 210.786683] print_req_error: I/O error, dev loop3, sector 3072 flags 0 [ 210.801065] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 210.815262] Buffer I/O error on dev loop3p2, logical block 99300, async page read [ 210.823030] Buffer I/O error on dev loop3p2, logical block 99301, async page read 22:50:30 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x400002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x40096101, &(0x7f0000000000)=0x1000000000000) 22:50:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) [ 210.824526] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 22:50:30 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x400002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x40096101, &(0x7f0000000000)=0x1000000000000) [ 210.854823] QAT: Device 0 not found 22:50:30 executing program 3: 22:50:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) [ 210.881504] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 210.909047] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 210.945930] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 210.982408] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 211.008058] QAT: Device 0 not found [ 211.013673] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 211.024816] ISOFS: Unable to identify CD-ROM format. 22:50:30 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x0) io_setup(0xeb, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, r0}]) [ 211.048807] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:30 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x400002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x40096101, &(0x7f0000000000)=0x1000000000000) [ 211.210603] QAT: Device 0 not found 22:50:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='net/netfilter\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 22:50:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:50:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x0, 0x4}}, 0x28) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) [ 211.373152] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.406939] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.423996] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.430055] ISOFS: Unable to identify CD-ROM format. [ 211.448732] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.463201] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.470541] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.477421] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.484627] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.492131] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.499007] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.506176] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 211.514434] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:33 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) 22:50:33 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clone(0x400002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x40096101, &(0x7f0000000000)=0x1000000000000) 22:50:33 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffe) 22:50:33 executing program 3: 22:50:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x0, 0x4}}, 0x28) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 22:50:33 executing program 3: [ 213.643580] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 213.666833] QAT: Device 0 not found [ 213.668789] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 213.699922] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 22:50:33 executing program 3: 22:50:33 executing program 4: [ 213.742604] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 213.781340] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 22:50:33 executing program 5: [ 213.788829] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 213.807810] ISOFS: Unable to identify CD-ROM format. [ 213.821430] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 22:50:33 executing program 4: [ 213.865804] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 213.894768] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 22:50:33 executing program 5: [ 213.927078] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 213.945016] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 213.971063] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:34 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) 22:50:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:34 executing program 3: 22:50:34 executing program 4: 22:50:34 executing program 5: 22:50:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 22:50:34 executing program 4: 22:50:34 executing program 5: [ 214.513924] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 214.539132] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 22:50:34 executing program 3: [ 214.586157] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 214.615924] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 214.628907] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 214.656775] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 214.672588] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 214.673477] ISOFS: Unable to identify CD-ROM format. [ 214.686833] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 22:50:34 executing program 4: 22:50:34 executing program 5: [ 214.705278] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 22:50:34 executing program 3: [ 214.729754] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 214.751972] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 214.781859] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:35 executing program 5: 22:50:35 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) 22:50:35 executing program 4: 22:50:35 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:35 executing program 3: 22:50:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 22:50:35 executing program 5: 22:50:35 executing program 3: 22:50:35 executing program 5: 22:50:35 executing program 4: [ 215.464878] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.484844] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.497287] ISOFS: Unable to identify CD-ROM format. 22:50:35 executing program 3: [ 215.534441] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.543156] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.550448] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.557410] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.565171] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.572140] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.579046] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.585829] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.592556] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 215.604588] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:35 executing program 5: 22:50:35 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) [ 215.810441] ISOFS: Unable to identify CD-ROM format. 22:50:36 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace(0x10, r0) 22:50:36 executing program 4: 22:50:36 executing program 3: 22:50:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 22:50:36 executing program 5: 22:50:36 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:36 executing program 4: 22:50:36 executing program 5: [ 216.361428] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.369810] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.376513] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 22:50:36 executing program 3: [ 216.452831] ISOFS: Unable to identify CD-ROM format. [ 216.476085] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 22:50:36 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace(0x10, r0) 22:50:36 executing program 5: 22:50:36 executing program 4: 22:50:36 executing program 3: [ 216.518303] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.544136] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.551805] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.561005] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.567678] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.574606] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.581387] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 216.589623] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:36 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace(0x10, r0) 22:50:36 executing program 5: 22:50:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 22:50:36 executing program 4: 22:50:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:36 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0xfdfdffff00000000, &(0x7f0000000000)='7'}) 22:50:36 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) 22:50:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 216.817226] binder: 8058:8059 ioctl c0306201 0 returned -14 [ 216.854316] binder: 8058:8059 ioctl c0306201 200000c0 returned -11 22:50:36 executing program 5: perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 216.866028] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 22:50:36 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x20000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) getsockname(0xffffffffffffff9c, &(0x7f00000004c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000580)=0x80) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000840)={&(0x7f0000000200), 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32=r1], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet_dccp_buf(r2, 0x21, 0x80, &(0x7f00000000c0)="eae8d3b1e52a341b690e3da6f6080cf4c8f8c6eec17f2748c87b651f7b6e9f2162916305edb7726051ae35933b51cc4988d31fb739919b79b18f6e7aa2cdf487ad2458f1cb2fcc47ca58b4b8fab1061471c08350e11ae5b13c0caded3e846eb87af79e9f5fa2ae3ac75b7b746d278caecb17e5b5203256759542", 0x7a) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9, 0x40) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x3, 0x401, 0xffffffff}, 0xc) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000400)) setsockopt$inet6_int(r3, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000540)={0x0, 0x0, 0x20, 0x1, 0x8001}, 0x2dc) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0x5c) [ 216.894867] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 216.951602] ISOFS: Unable to identify CD-ROM format. [ 216.958066] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 216.981128] mmap: syz-executor4 (8079) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 216.984942] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.004022] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.011463] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.019490] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.026662] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.034485] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.041660] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.048765] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 217.058255] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz0] on syz1 22:50:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 22:50:36 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, 0x0, 0xfda4) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0x0, 0x20000003, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) mount(&(0x7f0000000200)=@md0='/dev/md0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='udf\x00', 0x0, 0x0) r3 = shmget(0x0, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000040)=""/153) prctl$PR_GET_THP_DISABLE(0x2a) 22:50:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x300, 0x0, 0x0, 0x0, 0x0) [ 217.223877] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.249559] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 22:50:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x0, 0x10, 0x0) [ 217.273698] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.293472] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.329003] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.339483] isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 [ 217.355769] audit: type=1804 audit(1545605437.188:32): pid=8098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir379550923/syzkaller.BO0IYZ/26/file0" dev="sda1" ino=16629 res=1 [ 217.357808] ISOFS: Unable to identify CD-ROM format. [ 217.390080] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.397344] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 217.407221] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.414510] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 22:50:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) [ 217.422226] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 217.431548] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.438478] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.438945] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 217.453696] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 217.459271] UDF-fs: Scanning with blocksize 512 failed [ 217.466843] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz0] on syz1 [ 217.483705] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 217.496217] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 217.505531] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 217.512850] UDF-fs: Scanning with blocksize 1024 failed 22:50:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) [ 217.528493] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 217.538119] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 217.547858] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 217.554823] UDF-fs: Scanning with blocksize 2048 failed [ 217.560990] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 217.569984] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 22:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x300, 0x0, 0x0, 0x0, 0x0) [ 217.569995] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 217.570001] UDF-fs: Scanning with blocksize 4096 failed [ 217.570011] UDF-fs: warning (device md0): udf_fill_super: No partition found (1) [ 217.604282] audit: type=1804 audit(1545605437.408:33): pid=8098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir379550923/syzkaller.BO0IYZ/26/file0" dev="sda1" ino=16629 res=1 [ 217.679849] isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 [ 217.699512] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.729776] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.736471] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 22:50:37 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) [ 217.773011] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.773282] audit: type=1804 audit(1545605437.608:34): pid=8108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir379550923/syzkaller.BO0IYZ/26/file0" dev="sda1" ino=16629 res=1 [ 217.793763] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 22:50:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) [ 217.821258] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 217.830994] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.838380] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 217.848230] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.850757] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 217.855346] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.862441] UDF-fs: Scanning with blocksize 512 failed [ 217.868728] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.880848] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.882703] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 217.887874] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 217.897652] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 217.912253] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 217.919248] UDF-fs: Scanning with blocksize 1024 failed [ 217.926453] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz0] on syz1 [ 217.932588] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 217.946683] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 22:50:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init() r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x80000003) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="eb"], 0x1) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) read(r1, &(0x7f00000001c0)=""/199, 0xc7) [ 217.970045] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 217.976819] UDF-fs: Scanning with blocksize 2048 failed 22:50:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) sendfile(r1, r2, &(0x7f0000000040), 0x10000000000443) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) init_module(0x0, 0x0, &(0x7f0000000940)='/security}vmnet1keyring)self/\x00') fdatasync(0xffffffffffffffff) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000480), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000680)='trusted.overlay.redirect\x00', 0xc0, 0x0, &(0x7f0000000840)={0x0, 0x9, 0x0, 0x100, 0x9, 0x0, 0x200, 0x51b}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x7}, 0x28, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) [ 218.055555] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 218.097427] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 218.110010] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 218.131632] UDF-fs: Scanning with blocksize 4096 failed 22:50:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x3}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) [ 218.140866] UDF-fs: warning (device md0): udf_fill_super: No partition found (1) [ 218.155585] ISOFS: Unable to identify CD-ROM format. 22:50:38 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, 0x0, 0xfda4) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0x0, 0x20000003, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) mount(&(0x7f0000000200)=@md0='/dev/md0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='udf\x00', 0x0, 0x0) r3 = shmget(0x0, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000040)=""/153) prctl$PR_GET_THP_DISABLE(0x2a) 22:50:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) 22:50:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x101002) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) [ 218.374817] ISOFS: Unable to identify CD-ROM format. [ 218.443377] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.467056] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.474806] audit: type=1804 audit(1545605438.298:35): pid=8164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir379550923/syzkaller.BO0IYZ/27/file0" dev="sda1" ino=16648 res=1 [ 218.495244] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 22:50:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) 22:50:38 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, 0x0, 0xfda4) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0x0, 0x20000003, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) mount(&(0x7f0000000200)=@md0='/dev/md0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='udf\x00', 0x0, 0x0) r3 = shmget(0x0, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000040)=""/153) prctl$PR_GET_THP_DISABLE(0x2a) 22:50:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) sendfile(r1, r2, &(0x7f0000000040), 0x10000000000443) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) init_module(0x0, 0x0, &(0x7f0000000940)='/security}vmnet1keyring)self/\x00') fdatasync(0xffffffffffffffff) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000480), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000680)='trusted.overlay.redirect\x00', 0xc0, 0x0, &(0x7f0000000840)={0x0, 0x9, 0x0, 0x100, 0x9, 0x0, 0x200, 0x51b}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x7}, 0x28, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) [ 218.549831] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.586273] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.635979] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 218.653937] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.663703] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.670952] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.685224] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 218.695618] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.702672] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.709368] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 218.716627] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 218.731565] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz0] on syz1 [ 218.753150] UDF-fs: Scanning with blocksize 512 failed [ 218.766568] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 22:50:38 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) [ 218.778494] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 218.794145] ISOFS: Unable to identify CD-ROM format. [ 218.810151] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 218.817046] UDF-fs: Scanning with blocksize 1024 failed [ 218.829627] audit: type=1804 audit(1545605438.658:36): pid=8187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir539011344/syzkaller.XJuhaq/27/file0" dev="sda1" ino=16649 res=1 [ 218.842683] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 218.868468] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 218.877709] UDF-fs: warning (device md0): udf_load_vrs: No anchor found 22:50:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 22:50:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) [ 218.919871] UDF-fs: Scanning with blocksize 2048 failed [ 218.955892] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 218.983343] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 218.993758] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 219.001265] UDF-fs: Scanning with blocksize 4096 failed [ 219.013104] UDF-fs: warning (device md0): udf_fill_super: No partition found (1) [ 219.040713] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 219.051126] ISOFS: Unable to identify CD-ROM format. [ 219.056250] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 219.056270] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 219.072802] UDF-fs: Scanning with blocksize 512 failed 22:50:38 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, 0x0, 0xfda4) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0x0, 0x20000003, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) mount(&(0x7f0000000200)=@md0='/dev/md0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='udf\x00', 0x0, 0x0) r3 = shmget(0x0, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000040)=""/153) prctl$PR_GET_THP_DISABLE(0x2a) [ 219.086119] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 219.097860] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 219.107203] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 219.114865] UDF-fs: Scanning with blocksize 1024 failed 22:50:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x109202, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 22:50:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) [ 219.150622] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 219.188739] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 219.212039] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.218750] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.228058] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 219.238221] UDF-fs: Scanning with blocksize 2048 failed [ 219.250034] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.269213] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 219.272321] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.299146] audit: type=1804 audit(1545605439.128:37): pid=8213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir379550923/syzkaller.BO0IYZ/28/file0" dev="sda1" ino=16661 res=1 [ 219.325920] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.332360] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 219.342057] ISOFS: Unable to identify CD-ROM format. [ 219.347498] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.355889] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.360835] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 219.363273] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.370148] UDF-fs: Scanning with blocksize 4096 failed [ 219.376906] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.382344] UDF-fs: warning (device md0): udf_fill_super: No partition found (1) [ 219.389311] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.404085] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 219.408632] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 219.423617] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz0] on syz1 [ 219.443670] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 22:50:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) sendfile(r1, r2, &(0x7f0000000040), 0x10000000000443) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) init_module(0x0, 0x0, &(0x7f0000000940)='/security}vmnet1keyring)self/\x00') fdatasync(0xffffffffffffffff) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000480), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mq_open(&(0x7f0000000680)='trusted.overlay.redirect\x00', 0xc0, 0x0, &(0x7f0000000840)={0x0, 0x9, 0x0, 0x100, 0x9, 0x0, 0x200, 0x51b}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x7}, 0x28, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) [ 219.468430] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 219.493323] UDF-fs: Scanning with blocksize 512 failed 22:50:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x14, 0x3, 0x8, 0x1}, 0x14}}, 0x0) 22:50:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) [ 219.530287] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 219.571997] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 219.599869] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 219.608400] UDF-fs: Scanning with blocksize 1024 failed 22:50:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) [ 219.647985] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 219.674570] ISOFS: Unable to identify CD-ROM format. [ 219.680801] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 219.690321] UDF-fs: warning (device md0): udf_load_vrs: No anchor found 22:50:39 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)) prctl$PR_SET_PTRACER(0x59616d61, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) [ 219.697500] UDF-fs: Scanning with blocksize 2048 failed [ 219.710425] UDF-fs: error (device md0): udf_read_tagged: read failed, block=256, location=256 [ 219.722847] UDF-fs: error (device md0): udf_read_tagged: read failed, block=512, location=512 [ 219.740619] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 22:50:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x398) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:50:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@overriderock='overriderockperm'}]}) [ 219.761573] UDF-fs: warning (device md0): udf_load_vrs: No anchor found [ 219.769159] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 219.800125] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 219.819159] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 219.822265] UDF-fs: Scanning with blocksize 4096 failed [ 219.838890] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 219.863450] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 219.871034] UDF-fs: warning (device md0): udf_fill_super: No partition found (1) [ 219.884264] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 219.913995] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 219.924020] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 219.933601] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 219.942370] ================================================================== [ 219.949866] BUG: KASAN: slab-out-of-bounds in fpstate_init+0x50/0x160 [ 219.956475] Write of size 832 at addr ffff8881d2632bc0 by task syz-executor4/8252 [ 219.964093] [ 219.964404] ISOFS: Unable to identify CD-ROM format. [ 219.965739] CPU: 0 PID: 8252 Comm: syz-executor4 Not tainted 4.20.0-rc6-next-20181217+ #172 [ 219.965752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.965760] Call Trace: [ 219.965782] dump_stack+0x244/0x39d [ 219.965807] ? dump_stack_print_info.cold.1+0x20/0x20 [ 219.965825] ? printk+0xa7/0xcf [ 219.965849] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 220.008147] print_address_description.cold.4+0x9/0x1ff [ 220.013562] ? fpstate_init+0x50/0x160 [ 220.017482] kasan_report.cold.5+0x1b/0x39 [ 220.021726] ? fpstate_init+0x50/0x160 [ 220.025647] ? fpstate_init+0x50/0x160 [ 220.029526] check_memory_region+0x13e/0x1b0 [ 220.033949] memset+0x23/0x40 [ 220.037069] fpstate_init+0x50/0x160 [ 220.040776] kvm_arch_vcpu_init+0x3e9/0x870 [ 220.045092] kvm_vcpu_init+0x2fa/0x420 [ 220.048969] ? vcpu_stat_get+0x300/0x300 [ 220.053021] ? kmem_cache_alloc+0x33f/0x730 [ 220.057393] vmx_create_vcpu+0x1b7/0x2695 [ 220.061572] ? do_raw_spin_unlock+0xa7/0x330 [ 220.066000] ? vmx_exec_control+0x210/0x210 [ 220.070313] ? kasan_check_write+0x14/0x20 [ 220.074548] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 220.079480] ? futex_wait_queue_me+0x55d/0x840 [ 220.084085] ? wait_for_completion+0x8a0/0x8a0 [ 220.088676] ? print_usage_bug+0xc0/0xc0 [ 220.092746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.098270] ? get_futex_value_locked+0xcb/0xf0 [ 220.102937] kvm_arch_vcpu_create+0xe5/0x220 [ 220.107337] ? kvm_arch_vcpu_free+0x90/0x90 [ 220.111689] kvm_vm_ioctl+0x526/0x2030 [ 220.115583] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 220.120704] ? futex_wait+0x5ec/0xa50 [ 220.124507] ? kvm_unregister_device_ops+0x70/0x70 [ 220.129428] ? mark_held_locks+0x130/0x130 [ 220.133679] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 220.138934] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 220.144050] ? futex_wake+0x304/0x760 [ 220.147844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.153399] ? check_preemption_disabled+0x48/0x280 [ 220.158424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.163968] ? debug_smp_processor_id+0x1c/0x20 [ 220.168690] ? perf_trace_lock+0x14d/0x7a0 [ 220.172941] ? debug_smp_processor_id+0x1c/0x20 [ 220.177607] ? perf_trace_lock_acquire+0x15b/0x800 [ 220.182530] ? lock_is_held_type+0x210/0x210 [ 220.186954] ? perf_trace_lock+0x7a0/0x7a0 [ 220.191204] ? mark_held_locks+0x130/0x130 [ 220.195430] ? graph_lock+0x270/0x270 [ 220.199223] ? do_futex+0x249/0x26d0 [ 220.202944] ? rcu_read_unlock_special+0x370/0x370 [ 220.207893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.213492] ? check_preemption_disabled+0x48/0x280 [ 220.218516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.224046] ? find_held_lock+0x36/0x1c0 [ 220.228117] ? __fget+0x4aa/0x740 [ 220.231575] ? lock_downgrade+0x900/0x900 [ 220.235723] ? check_preemption_disabled+0x48/0x280 [ 220.240730] ? kasan_check_read+0x11/0x20 [ 220.244877] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 220.250165] ? rcu_read_unlock_special+0x370/0x370 [ 220.255090] ? __fget+0x4d1/0x740 [ 220.258557] ? ksys_dup3+0x680/0x680 [ 220.262274] ? __might_fault+0x12b/0x1e0 [ 220.266330] ? lock_downgrade+0x900/0x900 [ 220.270469] ? lock_release+0xa00/0xa00 [ 220.274436] ? perf_trace_sched_process_exec+0x860/0x860 [ 220.279886] ? kvm_unregister_device_ops+0x70/0x70 [ 220.284867] do_vfs_ioctl+0x1de/0x1790 [ 220.288774] ? ioctl_preallocate+0x300/0x300 [ 220.293170] ? __fget_light+0x2e9/0x430 [ 220.297131] ? fget_raw+0x20/0x20 [ 220.300571] ? _copy_to_user+0xc8/0x110 [ 220.304550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.310091] ? put_timespec64+0x10f/0x1b0 [ 220.314293] ? nsecs_to_jiffies+0x30/0x30 [ 220.318443] ? do_syscall_64+0x9a/0x820 [ 220.322419] ? do_syscall_64+0x9a/0x820 [ 220.326382] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 220.330952] ? security_file_ioctl+0x94/0xc0 [ 220.335373] ksys_ioctl+0xa9/0xd0 [ 220.338813] __x64_sys_ioctl+0x73/0xb0 [ 220.342690] do_syscall_64+0x1b9/0x820 [ 220.346575] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 220.351932] ? syscall_return_slowpath+0x5e0/0x5e0 [ 220.356870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.361734] ? trace_hardirqs_on_caller+0x310/0x310 [ 220.366764] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 220.371792] ? prepare_exit_to_usermode+0x291/0x3b0 [ 220.376823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.381663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.386849] RIP: 0033:0x457669 [ 220.390042] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 220.408945] RSP: 002b:00007f602e148c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 220.416667] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 220.423933] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 220.431188] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 220.438477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f602e1496d4 [ 220.445757] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 220.453025] [ 220.454641] Allocated by task 8252: [ 220.458257] save_stack+0x43/0xd0 [ 220.461712] kasan_kmalloc+0xcb/0xd0 [ 220.465430] kasan_slab_alloc+0x12/0x20 [ 220.469396] kmem_cache_alloc+0x130/0x730 [ 220.473548] vmx_create_vcpu+0x110/0x2695 [ 220.477702] kvm_arch_vcpu_create+0xe5/0x220 [ 220.482105] kvm_vm_ioctl+0x526/0x2030 [ 220.486005] do_vfs_ioctl+0x1de/0x1790 [ 220.489922] ksys_ioctl+0xa9/0xd0 [ 220.493386] __x64_sys_ioctl+0x73/0xb0 [ 220.497279] do_syscall_64+0x1b9/0x820 [ 220.501162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.506360] [ 220.508015] Freed by task 0: [ 220.511166] (stack is not available) [ 220.514858] [ 220.516483] The buggy address belongs to the object at ffff8881d2632b80 [ 220.516483] which belongs to the cache x86_fpu of size 832 [ 220.528814] The buggy address is located 64 bytes inside of [ 220.528814] 832-byte region [ffff8881d2632b80, ffff8881d2632ec0) [ 220.540589] The buggy address belongs to the page: [ 220.545528] page:ffffea0007498c80 count:1 mapcount:0 mapping:ffff8881d7a33680 index:0x0 [ 220.553670] flags: 0x2fffc0000000200(slab) [ 220.557915] raw: 02fffc0000000200 ffff8881d638ea48 ffff8881d638ea48 ffff8881d7a33680 22:50:40 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1048, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000023c0)) prctl$PR_SET_PTRACER(0x59616d61, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) [ 220.565799] raw: 0000000000000000 ffff8881d2632040 0000000100000004 0000000000000000 [ 220.573670] page dumped because: kasan: bad access detected [ 220.579397] [ 220.581016] Memory state around the buggy address: [ 220.585959] ffff8881d2632d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 220.593336] ffff8881d2632e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 220.600689] >ffff8881d2632e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 220.608049] ^ [ 220.613502] ffff8881d2632f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 220.620855] ffff8881d2632f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 220.628203] ================================================================== [ 220.635654] Disabling lock debugging due to kernel taint [ 220.649190] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 220.652877] Kernel panic - not syncing: panic_on_warn set ... [ 220.661784] CPU: 1 PID: 8252 Comm: syz-executor4 Tainted: G B 4.20.0-rc6-next-20181217+ #172 [ 220.665040] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 220.671658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.671664] Call Trace: [ 220.671681] dump_stack+0x244/0x39d [ 220.671699] ? dump_stack_print_info.cold.1+0x20/0x20 [ 220.671726] ? fpstate_init+0x30/0x160 [ 220.684660] kobject: 'hidraw' (000000000d7b6573): kobject_add_internal: parent: '0000:0000:0000.0010', set: '(null)' [ 220.687736] panic+0x2ad/0x632 [ 220.687752] ? add_taint.cold.5+0x16/0x16 [ 220.687773] ? preempt_schedule+0x4d/0x60 [ 220.692077] kobject: 'hidraw0' (000000004a2d867b): kobject_add_internal: parent: 'hidraw', set: 'devices' [ 220.693980] ? ___preempt_schedule+0x16/0x18 [ 220.693999] ? trace_hardirqs_on+0xb4/0x310 [ 220.694017] ? fpstate_init+0x50/0x160 [ 220.747433] end_report+0x47/0x4f [ 220.750886] kasan_report.cold.5+0xe/0x39 [ 220.755062] ? fpstate_init+0x50/0x160 [ 220.758957] ? fpstate_init+0x50/0x160 [ 220.762845] check_memory_region+0x13e/0x1b0 [ 220.767249] memset+0x23/0x40 [ 220.770372] fpstate_init+0x50/0x160 [ 220.774121] kvm_arch_vcpu_init+0x3e9/0x870 [ 220.778456] kvm_vcpu_init+0x2fa/0x420 [ 220.782361] ? vcpu_stat_get+0x300/0x300 [ 220.786441] ? kmem_cache_alloc+0x33f/0x730 [ 220.790769] vmx_create_vcpu+0x1b7/0x2695 [ 220.794961] ? do_raw_spin_unlock+0xa7/0x330 [ 220.799375] ? vmx_exec_control+0x210/0x210 [ 220.803707] ? kasan_check_write+0x14/0x20 [ 220.807945] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 220.812876] ? futex_wait_queue_me+0x55d/0x840 [ 220.817464] ? wait_for_completion+0x8a0/0x8a0 [ 220.822055] ? print_usage_bug+0xc0/0xc0 [ 220.826122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.831653] ? get_futex_value_locked+0xcb/0xf0 [ 220.836325] kvm_arch_vcpu_create+0xe5/0x220 [ 220.840745] ? kvm_arch_vcpu_free+0x90/0x90 [ 220.845067] kvm_vm_ioctl+0x526/0x2030 [ 220.848955] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 220.854059] ? futex_wait+0x5ec/0xa50 [ 220.857872] ? kvm_unregister_device_ops+0x70/0x70 [ 220.862812] ? mark_held_locks+0x130/0x130 [ 220.867053] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 220.872243] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 220.877341] ? futex_wake+0x304/0x760 [ 220.881142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.886675] ? check_preemption_disabled+0x48/0x280 [ 220.891692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.897226] ? debug_smp_processor_id+0x1c/0x20 [ 220.901894] ? perf_trace_lock+0x14d/0x7a0 [ 220.906169] ? debug_smp_processor_id+0x1c/0x20 [ 220.910895] ? perf_trace_lock_acquire+0x15b/0x800 [ 220.915854] ? lock_is_held_type+0x210/0x210 [ 220.920266] ? perf_trace_lock+0x7a0/0x7a0 [ 220.924502] ? mark_held_locks+0x130/0x130 [ 220.928735] ? graph_lock+0x270/0x270 [ 220.932538] ? do_futex+0x249/0x26d0 [ 220.936257] ? rcu_read_unlock_special+0x370/0x370 [ 220.941192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.946772] ? check_preemption_disabled+0x48/0x280 [ 220.951805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.957348] ? find_held_lock+0x36/0x1c0 [ 220.961423] ? __fget+0x4aa/0x740 [ 220.964879] ? lock_downgrade+0x900/0x900 [ 220.969031] ? check_preemption_disabled+0x48/0x280 [ 220.974049] ? kasan_check_read+0x11/0x20 [ 220.978215] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 220.983493] ? rcu_read_unlock_special+0x370/0x370 [ 220.988454] ? __fget+0x4d1/0x740 [ 220.991933] ? ksys_dup3+0x680/0x680 [ 220.995649] ? __might_fault+0x12b/0x1e0 [ 220.999716] ? lock_downgrade+0x900/0x900 [ 221.003865] ? lock_release+0xa00/0xa00 [ 221.007856] ? perf_trace_sched_process_exec+0x860/0x860 [ 221.013308] ? kvm_unregister_device_ops+0x70/0x70 [ 221.018240] do_vfs_ioctl+0x1de/0x1790 [ 221.022139] ? ioctl_preallocate+0x300/0x300 [ 221.026602] ? __fget_light+0x2e9/0x430 [ 221.030576] ? fget_raw+0x20/0x20 [ 221.034031] ? _copy_to_user+0xc8/0x110 [ 221.038010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 221.043547] ? put_timespec64+0x10f/0x1b0 [ 221.047702] ? nsecs_to_jiffies+0x30/0x30 [ 221.051857] ? do_syscall_64+0x9a/0x820 [ 221.055833] ? do_syscall_64+0x9a/0x820 [ 221.059807] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 221.064412] ? security_file_ioctl+0x94/0xc0 [ 221.068854] ksys_ioctl+0xa9/0xd0 [ 221.072315] __x64_sys_ioctl+0x73/0xb0 [ 221.076206] do_syscall_64+0x1b9/0x820 [ 221.080102] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 221.085470] ? syscall_return_slowpath+0x5e0/0x5e0 [ 221.090399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.095252] ? trace_hardirqs_on_caller+0x310/0x310 [ 221.100271] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 221.105290] ? prepare_exit_to_usermode+0x291/0x3b0 [ 221.110314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.115165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.120357] RIP: 0033:0x457669 [ 221.123555] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.142454] RSP: 002b:00007f602e148c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 221.150162] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 221.157429] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 221.164702] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 221.171971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f602e1496d4 [ 221.179247] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 221.187537] Kernel Offset: disabled [ 221.191165] Rebooting in 86400 seconds..