0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000080)) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2545.198026] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.198042] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:37:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4800, 0x0) [ 2545.198049] UDF-fs: Scanning with blocksize 512 failed [ 2545.204059] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:20 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x7d00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2545.205183] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.205195] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.205202] UDF-fs: Scanning with blocksize 1024 failed [ 2545.213127] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.213344] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:20 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x7d01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2545.213357] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.213365] UDF-fs: Scanning with blocksize 2048 failed [ 2545.220656] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.223760] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.223774] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.223780] UDF-fs: Scanning with blocksize 4096 failed 08:37:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4c00, 0x0) [ 2545.223789] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:37:20 executing program 1: prctl$PR_SET_PDEATHSIG(0x1, 0x41) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f0000000100)={0x40, 0x22, &(0x7f00000001c0)="527776ee1f9e6111cbf8e861c52a5269d28f8d98f0908c0034409986cc084666f01090a0d4974ade69228bf8c3b67dae2ff549d73b2848ce863a629dc8b2ccc86881ee8e5eac4413c3f842061faa44ef8d284bcc509665efdec1c82345a56352585198803a043de0c694b53933c14446c8cdf96851ccc78114d64b4deaa183d24c4c9cb3caf35ccd0615a5a21703fdd6dfc4fd7230bb8ce132883f81ead508fa816acc1359a3d28a40469a9d803599d8f9ba464449e045c389d9831c372aba37c5e3d1b9bb3c9c7becb4e1829537b4604d", {0x3, 0x7, 0x30395056, 0x3, 0x7, 0x7, 0x1, 0x8}}) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="00c700006f00040000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x1, 0x6, 0x2000}, 0x4) [ 2545.543721] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2545.543733] UDF-fs: Scanning with blocksize 512 failed [ 2545.545728] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:20 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x7e00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2545.545738] UDF-fs: Scanning with blocksize 1024 failed [ 2545.547221] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2545.547231] UDF-fs: Scanning with blocksize 2048 failed [ 2545.547478] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2545.547485] UDF-fs: Scanning with blocksize 4096 failed [ 2545.559863] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.560137] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6800, 0x0) [ 2545.560150] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.560158] UDF-fs: Scanning with blocksize 512 failed [ 2545.563279] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.563760] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.563771] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:37:20 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x7e01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2545.563778] UDF-fs: Scanning with blocksize 1024 failed [ 2545.566639] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.567110] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.567122] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.567129] UDF-fs: Scanning with blocksize 2048 failed [ 2545.569317] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.569999] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.570011] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.570020] UDF-fs: Scanning with blocksize 4096 failed [ 2545.570031] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2545.849642] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.850545] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.850558] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.850566] UDF-fs: Scanning with blocksize 512 failed [ 2545.851951] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.852654] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.852780] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.852789] UDF-fs: Scanning with blocksize 1024 failed [ 2545.853762] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.854088] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.854101] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.854109] UDF-fs: Scanning with blocksize 2048 failed 08:37:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x1800000000000000], [], [], [], []]}, 0x585) 08:37:21 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x2000003, 0x0) socket$packet(0x11, 0x2, 0x300) 08:37:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6c00, 0x0) [ 2545.855162] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2545.855977] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2545.855991] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2545.855999] UDF-fs: Scanning with blocksize 4096 failed [ 2545.856007] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:37:21 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000]]}, 0x120) 08:37:21 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x7f00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:21 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]]}, 0x120) 08:37:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7002, 0x0) 08:37:21 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x7f01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:21 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x20000}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000400)={0x1000, 0x4, 0x20, 0x1, 0xf1}) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r5, 0xc04c5349, &(0x7f00000001c0)={0x873d, 0xfffffff9, 0x8}) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="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"], 0x68}, 0x1, 0x0, 0x0, 0x40008800}, 0x1) r7 = semget(0x0, 0x0, 0x40) semctl$SETALL(r7, 0x0, 0x11, &(0x7f0000000080)=[0xfffe, 0x200]) mknod$loop(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) [ 2546.870419] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7400, 0x0) [ 2546.870430] UDF-fs: Scanning with blocksize 512 failed [ 2546.879601] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2546.879613] UDF-fs: Scanning with blocksize 1024 failed 08:37:21 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8000000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x1a00000000000000], [], [], [], []]}, 0x585) 08:37:21 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2546.880059] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2546.880068] UDF-fs: Scanning with blocksize 2048 failed [ 2546.880798] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2546.880806] UDF-fs: Scanning with blocksize 4096 failed 08:37:21 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b000000]]}, 0x120) 08:37:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7a00, 0x0) 08:37:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8001000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:22 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x400, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f00000002c0)=[{&(0x7f00000001c0), 0x0, 0xfffffffffffffffe}, {&(0x7f0000000200)="14e10006950ad418", 0x8, 0x8001}, {&(0x7f0000000240)="8500ac2bbdb07a4ad593b2e9d1afaf4ba000d589d15409521bbe0b15633f320632c637f9550d284220c76680f3b536af45d0de5fd261783f9a02e43790d114844245b2740288107c8da4eaa7939fd796b5581a40b2e6788d8e8429998925e217f94d", 0x62, 0xffff}], 0x740000, &(0x7f0000000480)={[{@sysvgroups='sysvgroups'}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfsdef={'smackfsdef'}}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, r2}}, {@audit='audit'}, {@fowner_lt={'fowner<', r4}}]}) [ 2547.126804] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2547.126815] UDF-fs: Scanning with blocksize 512 failed [ 2547.127121] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8100000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2547.127128] UDF-fs: Scanning with blocksize 1024 failed [ 2547.127926] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2547.127934] UDF-fs: Scanning with blocksize 2048 failed 08:37:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xedc0, 0x0) [ 2547.134369] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2547.134380] UDF-fs: Scanning with blocksize 4096 failed [ 2547.512191] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2547.512203] UDF-fs: Scanning with blocksize 512 failed [ 2547.514409] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:22 executing program 1: ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x14, 0xf, 0x156, &(0x7f00000001c0)}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap$dsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1800000, 0x10010, r1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/dev/nullb\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8101000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2547.514419] UDF-fs: Scanning with blocksize 1024 failed [ 2547.515591] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xf000, 0x0) [ 2547.515600] UDF-fs: Scanning with blocksize 2048 failed [ 2547.516760] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2547.516769] UDF-fs: Scanning with blocksize 4096 failed 08:37:22 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000]]}, 0x120) 08:37:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x1b00000000000000], [], [], [], []]}, 0x585) 08:37:22 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) socket$inet_smc(0x2b, 0x1, 0x0) r0 = dup(0xffffffffffffffff) unlink(&(0x7f0000000000)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6d, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x6d, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000004c0)={r6, 0x55f3, 0x0, 0x7ff, 0x400, 0x7ff, 0x71e, 0x6dc, {r10, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x2, 0x6, 0x7, 0x0, 0x6}}, &(0x7f0000000580)=0xb0) sendmsg$inet_sctp(r0, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000240)="98acc68a460d56cde3dbfe78dfdd5cd78981bfde03e3e4ec2fe5a9d11c55d8ec49383fc4a08dc3132f441762d9a3f4363f352686edd01b4cfa6668c056b4a42cfc2b4493f0ad97675ba0a999379ce6c53ac4c4dad4c4b18c19744e4d5fcd61dea0d75c59c9848e2e3204bb2050bf0ee09614f1cd0dbaeed7367262703f0c59b8e817ff960edfc3364c0c207bd10ea888d24a21dd1dd9d0935f38d7eec0305d7a778eb0a9ac1f", 0xa6}, {&(0x7f0000000300)="a23c5c6353e3b2a0a0c68c38325341fa0e6144f0731338da5d484280d97fbae939ca7b99aabd8f0e2e8530892391d1043694b4ea3ddc7f1fea03f2946d19551199c768fee9a170e47bac989c2f0a", 0x4e}, {&(0x7f00000001c0)="4b28ed04b92bc3b78d0abeadad8b6ba3bc3c5f142b9d88ebf5771c55e535b386f6570bf77f9c7f8ea168ca237ecc8933bce0827d58b756", 0x37}, {&(0x7f0000000380)="d179e0356c0b802670fdd7a561cf818ca459dd376a2e08efe187257f65cd3aa9aed2ed42dc3849e39a92c7677f20420aa37ce713eac75b28fee9cf5c792bf4295f406d371fe9e4b0659926325eafec1b0db2679376bc50c65612ed69b72746e145b848648773a31e446bae646a216049d7f177dfa40720ef53c92fbcda39f7b45dbcbe8ee47c121b83ed445d48ffa2195e20e15dfe3613ba9e911ca3500e444567c6b38a961e320bbb4a3213f48bd804a0616629aa9de80b52d872ce12903aa047b4adf36ccb2b216367b626cd0eecf03b577811574038e26868d009007bd584a6092554", 0xe4}], 0x4, &(0x7f00000005c0)=[@sndinfo={0x20, 0x84, 0x2, {0x7ff, 0x8005, 0x3, 0x1, r11}}], 0x20, 0x8000}, 0xe000000) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="5d297143a2ba4806d9"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) 08:37:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8200000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfeff, 0x0) 08:37:23 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]]}, 0x120) 08:37:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xff0f, 0x0) 08:37:23 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8201000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:23 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]]}, 0x120) 08:37:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfffe, 0x0) 08:37:23 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r1) setuid(r1) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340)='/dev/bsg\x00', 0x140, 0x0) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000380)={0x1, 0x9, 0x3ff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="1cad7e4b4b6f621ccef9766d9c7110d0ab9f26be12520a65c73aa779a1195339c18051677a2087642dcd41ba7aad19fe0dd01cb28d512ad59151ead293a75a11fbf5f12a7158984b01969c198fbacd2a007c5630bed33c831404abcbedb85dd0325fbfd8b72bbc1589500647a280d29c5e52d6b768d7567701c1fa72087bbb6dbe3b704ede22bf7aa5a491bf96ab9e861bef0b2f9a57d09233102ada2faf77beefcc4d6e76dc1124cef6756f7f8c442ba81352", 0xb3}], 0x4000, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f696e69745f697461626c652c6f626a5f726f26073d756466002cb0b26e633d4b455845435f4b45524e454cfbbbd1bce8fc30bf61736b3d4d41595f524541442c646f6e745f686173682c6673636f6e746578743d757365725f752c00"]) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2ffb65762f6e756c6c623000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x2800000000000000], [], [], [], []]}, 0x585) 08:37:23 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000]]}, 0x120) 08:37:23 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8300000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:23 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$netlink(r1, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x2}, 0xc) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:23 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8301000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x20000, 0x0) [ 2548.992920] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2548.992932] UDF-fs: Scanning with blocksize 512 failed [ 2548.995529] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2548.995539] UDF-fs: Scanning with blocksize 1024 failed [ 2548.995827] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:23 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8400000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:24 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r3) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r8 = syz_open_pts(r7, 0x4000000000000002) sendfile(r8, r6, 0x0, 0x6f0a77bd) r9 = getegid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r11, 0x80084504, &(0x7f0000000480)=""/182) r12 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r6, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r9, @ANYBLOB="5767bdde847756ccb633f2b90b2fe6ba16945173c7525bc3f888553e8453d861415c632563844dc76a5c05dcf463464a62834d65f945caa71a796801ededb8870f6b1b6450bb453855b8b6ad5642c5718a646496fdb1528cb254c7111d16a5e86be6a3e6fb4c75e596c4a57d8dff9de366f97afd43139fcdf5dfaa8c2a5468b6a926a58c93157116ab758e298f15dcc266c4cf5fd7c1f3a8b06ef956cb235d30c017b10ae05d906bfbb8bfc724af6118e85111d17fc475e9cd9c3cfb6f7af68d5b1fe6363f06d7d83e", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32, @ANYRES32=r12, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r9) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r9, 0x0, 0xee00, 0xee00, 0x0]) r13 = getgid() r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r15) chown(&(0x7f0000000340)='./file0\x00', r15, r13) r16 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6467762fa6db0500000000000000a661f8ec69e78284d6c927c1a1528b70bbb98a70"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = dup(r17) r19 = syz_open_dev$tty1(0xc, 0x4, 0x1) r20 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r20, 0x541c, &(0x7f0000000040)) ioctl$TIOCL_PASTESEL(r20, 0x541c, &(0x7f0000000300)) ppoll(&(0x7f0000000240)=[{r1, 0xc0d4}, {r19, 0x400}, {r1, 0x80}, {r0, 0x240a}], 0x4, &(0x7f0000000280), &(0x7f00000002c0)={0x3e}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) r21 = accept4$nfc_llcp(r18, &(0x7f00000000c0), &(0x7f00000001c0)=0x60, 0xc00) ioctl$sock_ifreq(r21, 0x8915, &(0x7f0000000200)={'veth1_vlan\x00', @ifru_hwaddr=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) 08:37:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x40000, 0x0) [ 2548.995836] UDF-fs: Scanning with blocksize 2048 failed [ 2548.997936] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2548.997946] UDF-fs: Scanning with blocksize 4096 failed 08:37:24 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x120) 08:37:24 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8401000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x3e00000000000000], [], [], [], []]}, 0x585) 08:37:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x60000, 0x0) 08:37:24 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2d, 'cpu'}, {0x5a, 'cpu'}, {0x2d, 'rdma'}]}, 0x10) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:24 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000]]}, 0x120) 08:37:24 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8500000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x80000, 0x0) 08:37:24 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000100)=0x101) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r8 = syz_open_pts(r7, 0x4000000000000002) sendfile(r8, r6, 0x0, 0x6f0a77bd) r9 = getegid() r10 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r6, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r9, @ANYBLOB, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r5, @ANYRES32=r10, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r9) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r9, 0x0, 0xee00, 0xee00, 0x0]) chown(&(0x7f00000001c0)='./file0\x00', r2, r9) r11 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:24 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8501000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2549.636826] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2549.636838] UDF-fs: Scanning with blocksize 512 failed 08:37:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xa0000, 0x0) 08:37:24 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8600000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2549.637152] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2549.637161] UDF-fs: Scanning with blocksize 1024 failed 08:37:24 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195", 0x5) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$assume_authority(0x10, r1) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:24 executing program 5: perf_event_open(0x0, 0x0, 0xffffffbfffffff7f, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0xb, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x9}]}, 0x1c}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) open(0x0, 0x0, 0x0) getpid() fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="11042cbd0001ffdbdf25020000000800010001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x80) [ 2549.637414] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2549.637422] UDF-fs: Scanning with blocksize 2048 failed [ 2549.637637] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2549.637645] UDF-fs: Scanning with blocksize 4096 failed [ 2550.196953] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 2550.224183] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2550.258061] UDF-fs: Scanning with blocksize 512 failed [ 2550.285850] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2550.293888] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 2550.337209] UDF-fs: Scanning with blocksize 1024 failed [ 2550.361905] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2550.371476] UDF-fs: Scanning with blocksize 2048 failed [ 2550.377339] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2550.387955] UDF-fs: Scanning with blocksize 4096 failed 08:37:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x7f00000000000000], [], [], [], []]}, 0x585) 08:37:25 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8601000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:25 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x120) 08:37:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xc0000, 0x0) 08:37:25 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffff96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x21000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000040)) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r6, 0x541c, &(0x7f0000000040)) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcsu\x00', 0x101000, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$unix(r3, &(0x7f0000000840)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000280)="5d0c0f16edef1a655befc1b06d852cec0de6ac4f808bbe0a65efa57af87d5be7b73f1b70b4a2fcf768b4f8c8fc7ad63a13664c6c2487594ff2f53ad1adc6386594ea873dc9d27ef6bcde54714502e2151d2324227fff139fa596ac41441349c3d64c4afe0971352e894690054ee99bd58bd4ec1c10d656e5ad1f1db822d78982608023d5e6053a5fcb1364d28b9c98942c4aa4c78d025e5909ac0f8548efe2346422727b5bd67625aa", 0xa9}, {&(0x7f0000000180)="34871fab5c3ec98a417fa885af9a1c43ac80b6c80fe1b478c3e4452f2cb4b1b59b6f2a0d59f2aafc4fdfde3702211dd9202c97097e397c149c9f", 0x3a}, {&(0x7f0000000340)="bd55606c509a87197faef7ab3e84e4c1f46c407a655fc96ce16cd8ff380db388", 0x20}, {&(0x7f0000000380)="39b642b36e98c7a7ee94ae5a36d5e1c249c67675f556916d83bb0a3103be0af7c63ff3e0f176faa54352a4472a31b38a7a0fe113477e3b17a7be57f06803accba636e5902e5c940c5a3dd79a22ca169a9c81a2f8e11c0fc56323575da1446c69be8948eb972a126d857bdb10ee9112034177e70bc48cdfd2d1e3ee319bfb76ff09a5a1113ff1f0f5f4fc46f7fda67fc24d1c100de0886c8059e67b802973cfecdbfcd7176b2dd2cdcbdde220ac9e79cd7a5738667874504c058ebad7a5c102a590a3636e72299ff7887b3cb3993a375cef070a2b97a67a9a5409188b39a553b824408a40d18554d44f27f8408f12a93d", 0xf0}, {&(0x7f00000006c0)="ed6ed966891aa2df63df495b6099237dc03ff6184b4485d61706c1303bcfe28218a610821d832515f95b9fef2c04a2ab0768c929bbaf2bb460f91c85000c2f0ca5dcd8bf850dafeeda3610d87561e43906c9d4ce40dc845014ad7aa11bdb8fdf429c3d7281fc74a2328ae37a8320c86eafdf8d6b90", 0x75}, {&(0x7f0000000480)="bc4c47be64e61970ff2bb29ac710827343c5e6590f7d18b1fa7210f9045a2a33e127d5cd23c5410a35fcc72fbac8", 0x2e}], 0x6, &(0x7f00000007c0)=[@rights={{0x28, 0x1, 0x1, [r2, r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6]}}, @rights={{0x1c, 0x1, 0x1, [r7, r0, r8]}}], 0x48, 0x1}, 0xbbf25dbcca94e9fc) r9 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r9, 0x12, 0x2, &(0x7f0000000000)=""/9, &(0x7f00000000c0)=0x9) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000240)) r10 = getuid() syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0, 0x0, 0x3}, {&(0x7f00000004c0)="6c51df5e79f18322160b691cc8f50fd49f518149c3f4238cb668c5de79d7bdca267dd1bb17fb0abfd4e8ff4044391913378aaaf3c7205e8cdbdb39a8f11f8c62067e645f7f99df5fc0f42d654c34b0ccc64e2a0df5578a6af142c42166c811e0e8ab963c914dfc29cd518e62553bf89d966f14d4b716db419caa245c89bcca15bbdc037be1aad82856b65b95741732d90e4ec4cd3a78eeb109a92e6a157442b35486829ebd2de848662972c51323c63c0aaef53f60c4116d71ef", 0xba}], 0x40, &(0x7f0000000b00)=ANY=[@ANYBLOB='utf8=1,utf8=0,nonumtail=0,shortname=win95,shortname=win95,utf8=0,hash,fsname=ip6_vt\a\x00\x00\x00euid<', @ANYRESDEC, @ANYBLOB='fowner<\x00'/20, @ANYRESDEC=r10, @ANYBLOB=',\x00']) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x0, 0x3, 0x10001, 0x10000, 0x8}, 0x20) 08:37:25 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000300)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RRENAME(r2, &(0x7f0000000080)={0x7, 0x15, 0x6}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000001c0)={{0x2, 0x1, 0x4, 0x3f, 0x9, 0x7f, 0x1, 0x81, 0x7, 0x8, 0x3, 0x40}, {0x1, 0x10000, 0xf, 0x6, 0x8, 0x5, 0x2, 0x1, 0x2, 0x4, 0xc1, 0x8}, {0xd000, 0x1, 0xf, 0xb2, 0x5, 0x2, 0x80, 0x7, 0x7f, 0x7, 0x8, 0x7}, {0x1004, 0x10000, 0xd, 0x5, 0x1f, 0x7f, 0x1, 0x6, 0xb5, 0x7f, 0x3f}, {0x4000, 0x1, 0xc, 0x1, 0x7, 0x1, 0x5, 0x2, 0x0, 0x0, 0x1, 0x20}, {0x0, 0x100000, 0x8, 0x7, 0x8, 0x35, 0x3, 0x1, 0xfe, 0xa4, 0x7, 0x5}, {0xf000, 0x0, 0x9, 0x3, 0xc9, 0x7f, 0x9, 0x6c, 0x1e, 0x3b, 0xc7, 0x99}, {0xd000, 0x8000, 0xd, 0x80, 0x2, 0x81, 0x1, 0x1, 0x6, 0x1, 0x6, 0x8}, {0x5000, 0x4005}, {0x6000, 0x4000}, 0x20040014, 0x0, 0x2004, 0x2000, 0x0, 0x2000, 0x11a005, [0x1, 0x52, 0x8, 0x9]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f78756c6c6230003d97ae16e840e48ceddb4d95e1922cce45387704bd36e7"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:25 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]]}, 0x120) 08:37:25 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/Gev/nullb0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xe0000, 0x0) 08:37:25 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8700000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:25 executing program 5: r0 = socket$inet(0x2, 0x2000000080002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'ipvlan0\x00', &(0x7f0000000100)=@ethtool_eeprom={0x43}}) recvmmsg(0xffffffffffffffff, &(0x7f0000005280)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)=""/17, 0x11}, {&(0x7f0000000080)=""/43, 0x2b}, {&(0x7f00000000c0)=""/15, 0xf}, {&(0x7f0000000140)=""/187, 0xbb}, {&(0x7f0000001280)=""/185, 0xb9}, {&(0x7f0000001340)=""/217, 0xd9}, {&(0x7f0000001440)=""/157, 0x9d}], 0x7, &(0x7f0000001580)=""/70, 0x46}, 0x4}, {{&(0x7f0000001600)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000001680)=""/98, 0x62}, 0x6}, {{&(0x7f0000001700)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/80, 0x50}, {&(0x7f0000001800)=""/27, 0x1b}, {&(0x7f0000001840)=""/36, 0x24}, {&(0x7f0000001880)=""/89, 0x59}, {&(0x7f0000001900)=""/185, 0xb9}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/173, 0xad}, {&(0x7f0000002a80)=""/205, 0xcd}], 0x8, &(0x7f0000002c00)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000003c00)=@caif=@dbg, 0x80, &(0x7f0000003d40)=[{&(0x7f0000003c80)=""/174, 0xae}], 0x1, &(0x7f0000003d80)=""/65, 0x41}, 0x8}, {{&(0x7f0000003e00)=@sco, 0x80, &(0x7f0000005100)=[{&(0x7f0000003e80)=""/113, 0x71}, {&(0x7f0000003f00)=""/8, 0x8}, {&(0x7f0000003f40)=""/146, 0x92}, {&(0x7f0000004000)=""/154, 0x9a}, {&(0x7f00000040c0)=""/51, 0x33}, {&(0x7f0000004100)=""/4096, 0x1000}], 0x6, &(0x7f0000005180)=""/242, 0xf2}, 0x1}], 0x5, 0x2c2a41fe8c46e487, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000280)=""/4096, &(0x7f0000000000)=0x1000) 08:37:25 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]]}, 0x120) [ 2551.056529] IPVS: length: 4096 != 8 08:37:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x9b00000000000000], [], [], [], []]}, 0x585) 08:37:25 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8701000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x100000, 0x0) 08:37:25 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2b1797bef44fb74cc81200d8c257b8cecf19c92e77c3c7708623298e01a78ab7dad5c8a22a125940435cecd588ddb7a8dc7501e0d97798f1b49663b0f344"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:25 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800c0000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="000cf7087000fbdbdf250a000000"], 0x14}, 0x1, 0x0, 0x0, 0x4004000}, 0x800) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x60443, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) r3 = creat(&(0x7f0000000380)='./file0\x00', 0x8) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f00000003c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='maps\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 08:37:25 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]]}, 0x120) 08:37:26 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]]}, 0x120) 08:37:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x1fffff, 0x0) 08:37:26 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000001c0)=""/120) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) getresuid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x100000, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@cache_none='cache=none'}, {@debug={'debug', 0x3d, 0xd9}}, {@version_u='version=9p2000.u'}, {@aname={'aname', 0x3d, 'vboxnet1em1'}}], [{@uid_gt={'uid>', r4}}, {@obj_user={'obj_user', 0x3d, 'udf\x00'}}, {@dont_hash='dont_hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'udf\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'proc-security:wlan0'}}]}}) msgget(0x1, 0x52c) 08:37:26 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8800000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:26 executing program 5: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x7530}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ion\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000, 0x0, 0x4]}}, r2}}, 0x48) dup2(r0, r1) [ 2551.505007] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2551.505035] UDF-fs: Scanning with blocksize 512 failed 08:37:26 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8801000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2551.511850] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2551.511863] UDF-fs: Scanning with blocksize 1024 failed [ 2551.512442] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2551.512452] UDF-fs: Scanning with blocksize 2048 failed [ 2551.512865] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2551.512879] UDF-fs: Scanning with blocksize 4096 failed 08:37:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x2], [], [], [], []]}, 0x585) 08:37:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6b6b6b, 0x0) 08:37:26 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$SIOCRSACCEPT(r1, 0x89e3) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x40) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000200)={0x30004, 0x4, 0x1, r0, 0x0, &(0x7f00000001c0)={0x98090e, 0x0, [], @p_u16=&(0x7f0000000100)=0x8}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75"], 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0xfffffffffffffe51, 0x5, 0x0, {0x0, 0x0, 0x0, 0x40}}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x4, 0x4, 0x2, 0x1, 0x2, 0xfdc4, 0x1b7, 0x9}, &(0x7f0000000180)=0x20) r7 = semget$private(0x0, 0x207, 0x0) semtimedop(r7, &(0x7f0000000080)=[{0x0, 0xff}, {0x7}], 0x2, 0x0) semctl$SETALL(r7, 0x0, 0x11, &(0x7f0000000200)=[0x8]) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="000600"/13]) chdir(&(0x7f0000000040)='./file0\x00') readv(r2, &(0x7f0000001700)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x2000, 0x0) 08:37:26 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8900000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:26 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]]}, 0x120) [ 2551.928681] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2551.928692] UDF-fs: Scanning with blocksize 512 failed 08:37:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x8011a0, 0x0) 08:37:26 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8901000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2551.945500] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2551.945512] UDF-fs: Scanning with blocksize 1024 failed [ 2551.945828] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2551.945837] UDF-fs: Scanning with blocksize 2048 failed 08:37:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f001000000000000000eeff000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='affs\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) [ 2551.946045] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2551.946051] UDF-fs: Scanning with blocksize 4096 failed 08:37:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xf0ffff, 0x0) 08:37:27 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]]}, 0x120) 08:37:27 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8a00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x7], [], [], [], []]}, 0x585) 08:37:27 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000001c0)={0x87, @rand_addr=0x9, 0x4e20, 0x0, 'nq\x00', 0x1f, 0x1f, 0x2b}, 0x2c) 08:37:27 executing program 5: timer_create(0x1, &(0x7f0000000000)={0x0, 0xc, 0x0, @thr={&(0x7f00000000c0)="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", &(0x7f0000000240)="445cd1b2a3ad5713051434d824243da9658dff7ea199c968a8437e97eb939636f2e1ee2b1f5499bf7c785c09878038f6bf8baaac21fbc055be71d6cd135532a7cdd82238a6468a85969621993b29cd2c6f66ca31f46f6f58f0786a4a984374862214c884a5eebebe91d92a4775eb8ad2800e755d71ac1ffd973aebf93cb382212e719254a08862a81d0388fbb5e6377a17252deec3b674596438ecea310594e5bc493fd8e43c83ef9446"}}, &(0x7f00000001c0)=0x0) timer_gettime(r0, &(0x7f0000000300)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/mls\x00', 0x0, 0x0) read$char_usb(r1, &(0x7f0000000440)=""/122, 0x7a) r2 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000340)={0x0, 0x0, [], @bt={0x80, 0x3, 0xffffffff, 0x1, 0x1, 0x3, 0x10, 0x1}}) sendmsg$kcm(r2, &(0x7f0000000200)={0x0, 0x24a, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c00810ee00f80ecdb4cb9e307f029a00d0000002f005ffb0a0002000300000000000f00480005000300", 0x2e}], 0x1}, 0x0) socket$alg(0x26, 0x5, 0x0) 08:37:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfeffff, 0x0) 08:37:27 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]]}, 0x120) 08:37:27 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8a01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2552.574691] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2552.609318] bridge: RTM_NEWNEIGH bridge0 with NTF_USE is not supported 08:37:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x1000000, 0x0) [ 2552.629488] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2552.629499] UDF-fs: Scanning with blocksize 512 failed [ 2552.629851] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2552.629860] UDF-fs: Scanning with blocksize 1024 failed [ 2552.630088] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2552.630096] UDF-fs: Scanning with blocksize 2048 failed [ 2552.630296] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2552.630304] UDF-fs: Scanning with blocksize 4096 failed 08:37:27 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x2000000000010d, 0xa, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000080)={@local, @remote, 0x0, 0x8, [@remote, @multicast2, @local, @empty, @remote, @remote, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000100)=0x6e) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000080)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6e826c6c623000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='hfs\x00', 0x0, 0x0) [ 2552.645936] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2552.645950] bridge: RTM_NEWNEIGH bridge0 with NTF_USE is not supported 08:37:27 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8b00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@setneightbl={0x0, 0x43, 0x10, 0x70bd2a, 0x25dfdbff, {0xc}, [@NDTA_THRESH1={0x0, 0x2, 0x9}, @NDTA_PARMS={0x0, 0x6, [@NDTPA_GC_STALETIME={0x0, 0x6, 0x4}, @NDTPA_PROXY_DELAY={0x0, 0xd, 0xda}, @NDTPA_MCAST_REPROBES={0x0, 0x11, 0x4}, @NDTPA_APP_PROBES={0x0, 0x9, 0xc0}]}, @NDTA_NAME={0x0, 0x1, 'bond\x00'}, @NDTA_THRESH3={0x0, 0x4, 0xffff8001}, @NDTA_THRESH3={0x0, 0x4, 0xe247}, @NDTA_NAME={0x0, 0x1, 'bond\x00'}]}, 0x44}}, 0x0) 08:37:27 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]]}, 0x120) 08:37:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x2000000, 0x0) [ 2552.812916] nbd_handle_cmd: 84 callbacks suppressed [ 2552.812932] block nbd0: Attempted send on invalid socket [ 2552.812955] print_req_error: 74 callbacks suppressed [ 2552.812964] print_req_error: I/O error, dev nbd0, sector 64 [ 2552.813204] block nbd0: Attempted send on invalid socket [ 2552.813218] print_req_error: I/O error, dev nbd0, sector 256 [ 2552.813263] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2552.813568] block nbd0: Attempted send on invalid socket [ 2552.813583] print_req_error: I/O error, dev nbd0, sector 512 [ 2552.813641] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2552.813654] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2552.813662] UDF-fs: Scanning with blocksize 512 failed [ 2552.814173] block nbd0: Attempted send on invalid socket [ 2552.814188] print_req_error: I/O error, dev nbd0, sector 64 [ 2552.814813] block nbd0: Attempted send on invalid socket [ 2552.814827] print_req_error: I/O error, dev nbd0, sector 512 [ 2552.815795] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2552.815990] block nbd0: Attempted send on invalid socket [ 2552.816006] print_req_error: I/O error, dev nbd0, sector 1024 [ 2552.816974] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2552.816986] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2552.816994] UDF-fs: Scanning with blocksize 1024 failed [ 2552.817344] block nbd0: Attempted send on invalid socket [ 2552.817359] print_req_error: I/O error, dev nbd0, sector 64 [ 2552.817546] block nbd0: Attempted send on invalid socket [ 2552.817560] print_req_error: I/O error, dev nbd0, sector 1024 [ 2552.817600] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2552.817740] block nbd0: Attempted send on invalid socket [ 2552.817754] print_req_error: I/O error, dev nbd0, sector 2048 [ 2552.817792] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2552.817803] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2552.817810] UDF-fs: Scanning with blocksize 2048 failed [ 2552.818214] block nbd0: Attempted send on invalid socket [ 2552.818226] print_req_error: I/O error, dev nbd0, sector 64 [ 2552.820300] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2552.820484] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2552.820496] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2552.820503] UDF-fs: Scanning with blocksize 4096 failed [ 2552.820513] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2553.087789] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2553.353118] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2553.353130] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2553.353136] UDF-fs: Scanning with blocksize 512 failed [ 2553.353739] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2553.354048] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x8], [], [], [], []]}, 0x585) 08:37:28 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001680)='/selinux/enforce\x00', 0x448000, 0x0) sendmsg$nl_netfilter(r0, 0x0, 0x80) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000, 0x0) getpid() r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) sched_setscheduler(r4, 0x5, &(0x7f0000000000)=0x200000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000300), 0x12) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r8, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 08:37:28 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8b01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:28 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/dev/nullb\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdirat(r3, &(0x7f0000000080)='./file1\x00', 0x110) 08:37:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x3000000, 0x0) [ 2553.354058] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2553.354064] UDF-fs: Scanning with blocksize 1024 failed [ 2553.354492] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2553.354646] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2553.354656] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2553.354662] UDF-fs: Scanning with blocksize 2048 failed [ 2553.355142] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:28 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8c00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2553.355277] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2553.355286] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2553.355293] UDF-fs: Scanning with blocksize 4096 failed [ 2553.355301] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2553.528093] ptrace attach of "/root/syz-executor.5"[10701] was attempted by "/root/syz-executor.5"[3524] [ 2553.534316] ptrace attach of "/root/syz-executor.5"[10701] was attempted by "/root/syz-executor.5"[3524] [ 2553.549492] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:28 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400000, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', 0x0, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f8595414", 0x1a, r2) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="daf81f6328692cc71cdc4ece469fb38c68d42a2911a2814bf7f3819cedf2bac575ca6adf954db19d8654352db5c48acda1523f778301bdb14842d5bd4f55db65dc0c4a91cf30254885cf1c29f858c97faf195aac99b1e469631cff65f18389a6d2969ea3851f988607c7beda32839a48f1f95d8bdef2badf99ea8b876fcae77acf4896d2199b2749e5f87bd89c056cec5f1f12809229ded0c822ab7e100c668fe3c67494c42bde96412143f818", 0xad, r2) keyctl$update(0x2, r3, &(0x7f0000000340)="a2fb26f735bf0ebfc6e096d527bcb5eb2b77698b5edc003176cbabd270d611a0d56ed02e30fecac140cd3152a135004383bd0a89abd20ada4d980a9715bb370bbe248d7bf27cca7f984121e729109e4b9f0c2881562d67d72045da8bdb474bbba2d30f5c57f3b1ace2fc71276080bbc4cb83ba9b96f502f181b6fbb2c4d40b01c3c95dcabd0909d3d427f244a6e62013c9a07d88c3a1feaeec050bd95c505fc6149b40e9a951b6e69e1ff7bb850a43297c3b5aa854a602e5052bf6ad256ecf13f15192f0ac1de0e3b007b2afccf7519c5b0a3a71cda5c07165991d", 0xdb) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$HCIINQUIRY(r6, 0x800448f0, &(0x7f0000000440)={0x6, 0x5, "ef48cf", 0x0, 0x72}) 08:37:28 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]]}, 0x120) 08:37:28 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8c01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2553.778843] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4000000, 0x0) [ 2553.778855] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2553.778862] UDF-fs: Scanning with blocksize 512 failed [ 2553.781753] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2553.782007] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:28 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) gettid() ptrace(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r6 = syz_open_pts(r5, 0x4000000000000002) sendfile(r6, r4, 0x0, 0x6f0a77bd) r7 = getegid() r8 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r4, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r7, @ANYBLOB, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r3, @ANYRES32=r8, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r7) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r7, 0x0, 0xee00, 0xee00, 0x0]) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r14 = syz_open_pts(r13, 0x4000000000000002) sendfile(r14, r12, 0x0, 0x6f0a77bd) r15 = getegid() r16 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r12, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r15, @ANYBLOB, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r11, @ANYRES32=r16, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r15) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r15, 0x0, 0xee00, 0xee00, 0x0]) getgroups(0x5, &(0x7f0000000100)=[0xffffffffffffffff, 0xee01, r7, 0xee01, r15]) fchown(0xffffffffffffffff, r0, r17) r18 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats\x00') r19 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r19, r18, 0x0, 0x7d) 08:37:28 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x100) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2553.782018] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2553.782026] UDF-fs: Scanning with blocksize 1024 failed [ 2553.784019] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2553.785135] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2553.785148] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2553.785156] UDF-fs: Scanning with blocksize 2048 failed [ 2553.787446] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2553.787621] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2553.787632] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2553.787640] UDF-fs: Scanning with blocksize 4096 failed [ 2553.787649] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2553.943963] ptrace attach of "/root/syz-executor.5"[10701] was attempted by "/root/syz-executor.5"[3524] [ 2554.082025] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.082597] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.082616] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.083907] UDF-fs: Scanning with blocksize 512 failed [ 2554.087449] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.087646] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.087658] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.087666] UDF-fs: Scanning with blocksize 1024 failed [ 2554.090663] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.091935] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.091949] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.091957] UDF-fs: Scanning with blocksize 2048 failed [ 2554.094428] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.095138] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.095156] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.095397] UDF-fs: Scanning with blocksize 4096 failed [ 2554.095408] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2554.097331] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2554.097339] UDF-fs: Scanning with blocksize 512 failed [ 2554.098580] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2554.098588] UDF-fs: Scanning with blocksize 1024 failed [ 2554.098893] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2554.098902] UDF-fs: Scanning with blocksize 2048 failed [ 2554.099553] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2554.099562] UDF-fs: Scanning with blocksize 4096 failed [ 2554.262182] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2554.262195] UDF-fs: Scanning with blocksize 512 failed [ 2554.269136] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2554.269149] UDF-fs: Scanning with blocksize 1024 failed 08:37:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x9], [], [], [], []]}, 0x585) 08:37:29 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8d00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x5000000, 0x0) 08:37:29 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet6(0xa, 0xa, 0x10) sendmsg(r0, &(0x7f0000001bc0)={&(0x7f00000001c0)=@generic={0xf04800fc85241f6c, "7d05e1a33a14dfc5ed33860bd5458bb5d6d3159ac9d5d691f3218aeebec8629b4d19eaed67b4992f184a179991fa20f216c04fa2c6c262e9407e83b720a46f8a689534b6b25173214358f810542b055b3d2fc328e4c11eca9c1f0c52570b81716125550bc48557c3db269003afc0c6f6a7269ce74ac331ee5f60132c7d33"}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000240)="0e7dbffbb02eba6ce55171639d594168621db35dcab9162d7eff3ebda8ec1d3c25f3cc2a1adccb408da5347c66947b83f1be036c0e52c0bbfa0dd4a0c1384563b4056b73d8f38a948bd1f136de666102a1b6f1c893", 0x55}, {&(0x7f0000000080)="9f5397d07b41a72587eb3b0d283bfb5ffdb0a6a006c2127cc4c8d1", 0x1b}, {&(0x7f0000000100)="8f2cc6", 0x3}, {&(0x7f00000002c0)="0f756414109b2358b1d1c7c887f9f30a2e19cf22aafe814c4ed39f7d50351adaff7b1a310038211f42d565b20d1c123bc0257957b942dd08cfed19f9f4aa38723ea17ba3462dc3b44db6049d0a50ab49b6239f7bf479106f7be41a00fb368dd1e0e12d3534aa3119f87443a4608d40f21504ee8e635196ca1789c336c8fb19e53e709d6ee5d584c5e59d0391c6ad597dc8b0555415078efa33618a3aa565facbe5a5d12b47", 0xa5}, {&(0x7f0000000380)="1028d528750548775d182752146eb0b4c49cf270bd85cecc1b69cb3c9fb0128e33263b0bba251f0675c7e8206d020c5d0795542d055d570320cde216651d0753be7c42a79018c61d0ba3331c3bef2c48948bb54d95031857618c73bc373d319634ed6d69354ebde6a250cf5bc10eb5efa0511b96529310eafc69171bdfab826db610605284c95ff62f3f1f61e5ee7b5c3d9666544ee6ae4b7cf7b81bfc0d47ad2ae51150cb621fb240cd9a937b2ad18025f6c9af0aab69ba44579ad98534e21bdd38e7acda31882880aecf8f56a0b81de615c27614c78d67c2", 0xd9}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="b2d0a61a66a73a628b74272d3821c5f0eb5347dc93ceaf5e2ce2afc7233dd6b963da472ecf80fd75a3fcfa732b4f7a27f645c404ed7cdfc6f28a782d1e8d0bc5139b5d7f363ac72efaa59f980468ef782c3737073ce8f6c4afd32099ecdfb7b880f1e17c5a789a5e64f98717c0be7341a86ec530a0890d8a05f0b59a0290a6d8624ff7c0d0d8c22493959c0645f52c8e79a2e7d1e2326581e09ea7d30545", 0x9e}, {&(0x7f0000001540)="cdab9b1a87e57003d79252733b86b89d88f05fecea56a185bf58f9e54cdd12413ae5d37c9923abe83139ad655e91bfbcee403b1056496fa7af2be969c8ab730302f1044e2dfe2f02850fe749df06a8dec9ea04fd647f156ec46f97998c36629cc3bdab03447819365e50d933a2399e958ae6d4e412f4042b8700d3586a", 0x7d}, {&(0x7f00000015c0)="8b25e96903863e2831129fcc", 0xc}], 0x9, &(0x7f0000001c80)=[{0xe0, 0x113, 0x401, "1ec154e7a6cd651cd5f242db1e0dbd061a3dd58404a0647a5ff7b5f5f0bf2503d4eab41881f893e6a6974adc1636e9a17022f336d22fd62e0c1f60dad609451a67320b0e97a529257b139c43ef92c342835020e9affc48a624d3894cb1d0cf58c16ce4db87a00087bbb083d130ae9d82b1476d91c8c8bc9002cea63890e437d9512af696b0681bac03fa82dc58dc5cfb7cf64b5334380ecafed2107f22b8561b2f16d75e569b5c00a0d08258d82261dfefc1062b1e758dfbc9ed26855a936a0a3299877e980a526ad513"}, {0xe0, 0x113, 0x8, "5b2038d84faa83bf2c6eaa847c70ae50514c2d540e49779e29b9416b4e8fee073b6e8c0d539822bb56ff52d70fc8a106c90918e4ae81d7022c3bbae170f17dba8c5fd14b549456aacdad29f5ba8edc8755abbacb21995a416a17ec5e259adaa06bc9d526b555f677bfc6fd0cdf46dc57101a5ea6af0a9403d7d07c706ae15a01535baa16a15ada8ecd67bfe1cf8e1533850c7c7ee1ec0284f25069d3c1b1e41112bea83d70b17432a45148896169ffee83aa4517089d2c0a3218fbf897c56c9e047698bc36108488cd0d775f8b"}, {0x108, 0x1, 0x2, "a314bebf9c115ca450003d6d3e33055163f680f5672587a884f9c910a783af5e2a5dece6dd45b8522407896a3f552cb4c4de2845722a558b110740f3b47272566bf1661b0fe30e2f6a3f92883daa57b91f4e54a2ab33f902f2092d72db3b52c8244065e69bb6157080d0b40e16492e9746c79bd3536ea6531a7e490bd58fccad8d081d875c98f32c71113b7f9fde159e85c86aeb45c8ab98e72b91b23e293c941ea8d166caa65c6d8619abfad55aa643fde84d9b9b31bec800cfb9787f09e436f89b8b6ed91fa5131ad3ea87db7697e2f24318543dbe75c96609a5a54ed5ba8d8b698df2b8ac549fd21d59d95237687803147733632a"}, {0xc0, 0x16, 0x3, "ebd21db22c0ea873e4178108f6372cf101c528eeb7d782129402a7ae9319714db65a137629e8ee0e94c538083c4e038c22366d39d8090ca13b24c16875a9bf49150bf28782f2782448824b26ba6c86069b92280d2db09241af34926c3a25206797283cc862d722b7ab7019353d94098a231fe329874d679254794bcc3e74af3ab6215b7f128cdafbb2a204cd46447ebe3e8f8de855b4c73f09d539d4b6b3d456b89f06d74bf8ea1efaa8"}, {0x50, 0x75f4863789de0261, 0x1000, "a32f0b8daf795460a005cc135f8e03a6c5802867fb2c68c58eb6a875d0d84c0a307679d89915352fdecc5ba4cb314d52679ad1ff88acb0ed7c"}, {0x98, 0x29, 0x4a, "a4285fee433d6faa6122dbda721f8ac5df928b2669b40ab4b100f8dcb7d832ec074aea993f35da63e97bd35a1d6311ae819d1c92cd63b1a3341a07098c5dfd75db537925df6d7ebe60d61a189ab0e437224ceb42f4adb37e260737e3e493a7cb0b6cc473dac62e5f91a61237165a1914be1eea783faceb268c340f9d88b6d287629b92f462"}, {0x88, 0x110, 0x9, "4f7bef2d4d95614c7bbe11c1c28512fcb184114e7c3ae5a274021ce1b40933d7a9bc02c893db58a070395004955e8b03c834ec9e47d9d7ed79700c0cf69db2e1c9f89e6b769499c1ec97212d21181c948d6d3ea3452e94be13da95aa8d304af5d946d7f866e7f541902308d5c72dc58892a5"}], 0x4f8}, 0x8001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f0000001c00)=ANY=[@ANYBLOB="090065762f6e75806c62300032402e6d0fc55ce7515a2fa0c9549d6f2c195c0d8674e2d86e4d22a5a3fdad49b391c49de0b37c1202e04beca7f4184d1a764efc5210f090e714f068ef5309c613cab8b1819ff6f6e405cb29a648923b6cb700d2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2554.269502] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2554.269511] UDF-fs: Scanning with blocksize 2048 failed [ 2554.269734] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2554.269742] UDF-fs: Scanning with blocksize 4096 failed 08:37:29 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]]}, 0x120) 08:37:29 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8d01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:29 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f646576006e756c6c62d856d0ddb68d123c6c4bcfbc"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000080)) 08:37:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6000000, 0x0) [ 2554.714806] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.715094] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.715107] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.715115] UDF-fs: Scanning with blocksize 512 failed 08:37:29 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8e00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2554.722325] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.722550] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7000000, 0x0) [ 2554.722563] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.722571] UDF-fs: Scanning with blocksize 1024 failed [ 2554.724617] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.725757] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.725825] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.725833] UDF-fs: Scanning with blocksize 2048 failed [ 2554.726304] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.726908] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.726919] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.726925] UDF-fs: Scanning with blocksize 4096 failed [ 2554.726934] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2554.971300] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.971567] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.971579] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.971586] UDF-fs: Scanning with blocksize 512 failed [ 2554.972387] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.972586] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.972598] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.972606] UDF-fs: Scanning with blocksize 1024 failed [ 2554.973206] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.973442] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.973453] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.973462] UDF-fs: Scanning with blocksize 2048 failed [ 2554.982509] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2554.982744] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2554.982756] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2554.982764] UDF-fs: Scanning with blocksize 4096 failed [ 2554.982780] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2555.220351] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2555.220622] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2555.220635] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2555.220643] UDF-fs: Scanning with blocksize 512 failed [ 2555.221397] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2555.221591] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2555.221603] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2555.221610] UDF-fs: Scanning with blocksize 1024 failed [ 2555.222130] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2555.222398] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2555.222409] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2555.222417] UDF-fs: Scanning with blocksize 2048 failed [ 2555.222866] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2555.223028] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xe8fd030000000004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000000)={[{@fat=@allow_utime={'allow_utime'}}]}) r0 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='allow_utime', 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000200)={r0, 0x54, 0xe2}, &(0x7f0000000240)={'enc=', 'raw', ' hash=', {'sha224-ssse3\x00'}}, &(0x7f00000002c0)="c4f09def29c6ee6670a6ca2f1f292ad55bd072be29bb039fd28067b578f53582c9500cd5fafd0740b0ed035a55a530cc796defa0a2235e1fce97fe1ecfb8e7b641c6c850bd38f3ce32faa8d73b09a188f672ab33", &(0x7f0000000340)=""/226) 08:37:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x8000000, 0x0) [ 2555.223042] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2555.223050] UDF-fs: Scanning with blocksize 4096 failed [ 2555.223060] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2555.686294] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2555.686575] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2555.686587] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2555.686595] UDF-fs: Scanning with blocksize 512 failed [ 2555.688801] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2555.689027] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2555.689037] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2555.689042] UDF-fs: Scanning with blocksize 1024 failed [ 2555.689549] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2555.690935] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2555.690948] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:37:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xa], [], [], [], []]}, 0x585) 08:37:30 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8e01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:30 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r3, 0x2000000000010d, 0xa, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) connect$pppl2tp(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x0, 0x1, 0x1, {0xa, 0x4e20, 0x10001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}}}, 0x32) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6e756c6c6230003007b6912826ac6f96b95c1b7e018bcf4f611df870496e94383a195493ee9f3ded"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:30 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]]}, 0x120) 08:37:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x9000000, 0x0) 08:37:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ENDIAN(r10, 0x4008af13, &(0x7f0000000380)={0x8e0cbb4fb3214c71, 0x3}) [ 2555.690955] UDF-fs: Scanning with blocksize 2048 failed [ 2555.692230] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2555.692386] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2555.692396] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2555.692404] UDF-fs: Scanning with blocksize 4096 failed [ 2555.692413] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2556.009579] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2556.025487] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2556.034992] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2556.049539] UDF-fs: Scanning with blocksize 512 failed 08:37:30 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]]}, 0x120) [ 2556.067252] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:30 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8f00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:31 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x20080, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000001c0)={0x50000000}) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f000000000000000000000000e300"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xa000000, 0x0) [ 2556.125134] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2556.125148] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2556.125155] UDF-fs: Scanning with blocksize 1024 failed 08:37:31 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x8f01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2556.126669] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2556.126954] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2556.126966] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2556.127003] UDF-fs: Scanning with blocksize 2048 failed 08:37:31 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c623000bbeb55b6d6040100001601f45e9ddcd68c0512055d087fef6b0859bda18db457c542184a238f51b1eae046d9e193b6b663b9c7313163d138f6fb872254d665e3e0c7081d5341087b015bc1735c03de26469fa98ff611752ef168d0f9f79db0d26f567ddfe6e9022b58f30d0a7110ba6aa438f71a8ef0a4e2638f7c1cde9eeb1e28f18082"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2556.127459] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2556.127624] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2556.127635] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2556.127642] UDF-fs: Scanning with blocksize 4096 failed [ 2556.127651] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2556.412880] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2556.413568] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2556.413580] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2556.413588] UDF-fs: Scanning with blocksize 512 failed [ 2556.416110] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2556.416485] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2556.416564] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2556.416896] UDF-fs: Scanning with blocksize 1024 failed [ 2556.419719] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2556.421306] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2556.421321] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2556.421329] UDF-fs: Scanning with blocksize 2048 failed [ 2556.423666] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2556.424023] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2556.424035] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2556.424042] UDF-fs: Scanning with blocksize 4096 failed [ 2556.424052] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2556.683092] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2556.683104] UDF-fs: Scanning with blocksize 512 failed [ 2556.684225] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2556.684235] UDF-fs: Scanning with blocksize 1024 failed [ 2556.685342] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2556.685351] UDF-fs: Scanning with blocksize 2048 failed [ 2556.686461] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2556.686471] UDF-fs: Scanning with blocksize 4096 failed 08:37:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xc], [], [], [], []]}, 0x585) 08:37:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xc000000, 0x0) 08:37:32 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9000000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:32 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]]}, 0x120) 08:37:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ENDIAN(r10, 0x4008af13, &(0x7f0000000380)={0x8e0cbb4fb3214c71, 0x3}) [ 2557.523852] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2557.524268] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2557.524278] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:37:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x10000000, 0x0) 08:37:32 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9001000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2557.524285] UDF-fs: Scanning with blocksize 512 failed [ 2557.526296] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2557.526567] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2557.526578] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2557.526585] UDF-fs: Scanning with blocksize 1024 failed [ 2557.527062] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2557.527421] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2557.527432] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2557.527438] UDF-fs: Scanning with blocksize 2048 failed [ 2557.529085] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2557.529257] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2557.529269] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2557.529277] UDF-fs: Scanning with blocksize 4096 failed [ 2557.529285] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2557.849145] nbd_handle_cmd: 122 callbacks suppressed [ 2557.849160] block nbd0: Attempted send on invalid socket [ 2557.849175] print_req_error: 122 callbacks suppressed [ 2557.849183] print_req_error: I/O error, dev nbd0, sector 64 [ 2557.852357] block nbd0: Attempted send on invalid socket [ 2557.852375] print_req_error: I/O error, dev nbd0, sector 256 [ 2557.852559] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2557.853455] block nbd0: Attempted send on invalid socket [ 2557.853470] print_req_error: I/O error, dev nbd0, sector 512 [ 2557.854460] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2557.854474] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2557.854483] UDF-fs: Scanning with blocksize 512 failed 08:37:32 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9100000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2557.856634] block nbd0: Attempted send on invalid socket [ 2557.856651] print_req_error: I/O error, dev nbd0, sector 64 [ 2557.857710] block nbd0: Attempted send on invalid socket [ 2558.022875] print_req_error: I/O error, dev nbd0, sector 512 [ 2558.023047] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2558.058187] block nbd0: Attempted send on invalid socket [ 2558.063832] print_req_error: I/O error, dev nbd0, sector 1024 [ 2558.069951] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2558.079159] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2558.086189] UDF-fs: Scanning with blocksize 1024 failed [ 2558.092124] block nbd0: Attempted send on invalid socket [ 2558.097805] print_req_error: I/O error, dev nbd0, sector 64 08:37:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ENDIAN(r10, 0x4008af13, &(0x7f0000000380)={0x8e0cbb4fb3214c71, 0x3}) 08:37:32 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000]]}, 0x120) [ 2558.103973] block nbd0: Attempted send on invalid socket [ 2558.109563] print_req_error: I/O error, dev nbd0, sector 1024 [ 2558.115643] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2558.124837] block nbd0: Attempted send on invalid socket [ 2558.130447] print_req_error: I/O error, dev nbd0, sector 2048 [ 2558.136629] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2558.149387] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2558.181747] UDF-fs: Scanning with blocksize 2048 failed [ 2558.228950] block nbd0: Attempted send on invalid socket [ 2558.234518] print_req_error: I/O error, dev nbd0, sector 64 [ 2558.240886] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2558.282248] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2558.308753] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:37:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xd], [], [], [], []]}, 0x585) [ 2558.334524] UDF-fs: Scanning with blocksize 4096 failed [ 2558.368831] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:37:33 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9101000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:33 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000]]}, 0x120) 08:37:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ENDIAN(r10, 0x4008af13, &(0x7f0000000380)={0x8e0cbb4fb3214c71, 0x3}) 08:37:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x20000000, 0x0) [ 2558.773437] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:33 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9200000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:33 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00000000000000]]}, 0x120) 08:37:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xe], [], [], [], []]}, 0x585) [ 2558.830093] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) [ 2558.888599] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2558.944959] UDF-fs: Scanning with blocksize 512 failed [ 2558.987995] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:33 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]]}, 0x120) [ 2559.036400] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:33 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) lstat(&(0x7f0000003500)='./file0/file0\x00', &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r10 = syz_open_pts(r9, 0x4000000000000002) sendfile(r10, r8, 0x0, 0x6f0a77bd) r11 = getegid() r12 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r8, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r11, @ANYBLOB, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r7, @ANYRES32=r12, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r11) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r11, 0x0, 0xee00, 0xee00, 0x0]) r13 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000003700)='/dev/dlm-monitor\x00', 0x208000, 0x0) r14 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r14, 0x541c, &(0x7f0000000040)) r15 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r15, 0x541c, &(0x7f0000000040)) r16 = openat$cuse(0xffffffffffffff9c, &(0x7f0000003740)='/dev/cuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) r19 = accept$packet(r18, &(0x7f0000003780), &(0x7f00000037c0)=0x14) r20 = syz_open_dev$tty20(0xc, 0x4, 0x0) r21 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r21, 0x541c, &(0x7f0000000040)) r22 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000003800)='cgroup.subtree_control\x00', 0x2, 0x0) r23 = inotify_init1(0x0) fcntl$setown(r23, 0x8, 0xffffffffffffffff) fcntl$getownex(r23, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r24, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) r25 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r26) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r28 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r29 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r30 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r31 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r32 = syz_open_pts(r31, 0x4000000000000002) sendfile(r32, r30, 0x0, 0x6f0a77bd) r33 = getegid() r34 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r30, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r33, @ANYBLOB, @ANYRES32=r27, @ANYRES32=r28, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r29, @ANYRES32=r34, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r33) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r33, 0x0, 0xee00, 0xee00, 0x0]) r35 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r35, 0x541c, &(0x7f0000000040)) r36 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r36, 0x541c, &(0x7f0000000040)) r37 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r37, 0x541c, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r39 = dup(r38) ioctl$PERF_EVENT_IOC_ENABLE(r39, 0x8912, 0x400200) r40 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r40, 0x541c, &(0x7f0000000040)) ioctl$VIDIOC_G_EXT_CTRLS(r39, 0xc0205647, &(0x7f0000003e00)={0x9a0000, 0x9, 0x1, r40, 0x0, &(0x7f0000003dc0)={0x980928, 0xfffffffc, [], @value=0x8}}) r42 = inotify_init1(0x0) fcntl$setown(r42, 0x8, 0xffffffffffffffff) fcntl$getownex(r42, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r43, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) r44 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r45) r46 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r47 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r48 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r49 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r50 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r51 = syz_open_pts(r50, 0x4000000000000002) sendfile(r51, r49, 0x0, 0x6f0a77bd) r52 = getegid() r53 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r49, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r52, @ANYBLOB, @ANYRES32=r46, @ANYRES32=r47, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r48, @ANYRES32=r53, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r52) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r52, 0x0, 0xee00, 0xee00, 0x0]) r54 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r54, 0x541c, &(0x7f0000000040)) r55 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r55, 0x541c, &(0x7f0000000040)) r56 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000004040)='/proc/self\x00', 0x109001, 0x0) r57 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r57, 0x541c, &(0x7f0000000040)) r58 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r58, 0x541c, &(0x7f0000000040)) r59 = syz_open_dev$dri(&(0x7f0000004080)='/dev/dri/card#\x00', 0x80000000, 0x0) r60 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r60, 0x541c, &(0x7f0000000040)) r61 = socket(0x4, 0xa, 0x3) r62 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r62, 0x541c, &(0x7f0000000040)) r63 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000040c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r64 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r64, 0x541c, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r66 = dup(r65) ioctl$PERF_EVENT_IOC_ENABLE(r66, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000004100)={0x0, 0x0}) r69 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r69, 0x541c, &(0x7f0000000040)) ioctl$VIDIOC_DQBUF(r66, 0xc0585611, &(0x7f0000004140)={0x366e77ce, 0xa, 0x4, 0x100, 0x1f, {r67, r68/1000+10000}, {0x4, 0x8, 0x5, 0x2, 0xff, 0x7f, "44551ca3"}, 0x5, 0x2, @offset=0x6, 0x9, 0x0, r69}) r71 = socket$can_raw(0x1d, 0x3, 0x1) r72 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000041c0)='/selinux/load\x00', 0x2, 0x0) r73 = gettid() r74 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r75 = dup2(0xffffffffffffffff, r74) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r75, 0xc08c5332, 0x0) r76 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r76) r77 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r77, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a00000000000000000", 0x23}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r77, 0x227d, 0x0) kcmp(r76, r73, 0x0, 0xffffffffffffffff, r77) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x4, 0x4, 0x0, 0x10002}, &(0x7f00000009c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x79c9e9235c799199) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r73, r75, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r78}, 0x30) r79 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004200)={r78}, 0xc) r80 = fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0}) r82 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r83 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r84 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r85 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r86 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r87 = syz_open_pts(r86, 0x4000000000000002) sendfile(r87, r85, 0x0, 0x6f0a77bd) r88 = getegid() r89 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r85, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r88, @ANYBLOB, @ANYRES32=r82, @ANYRES32=r83, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r84, @ANYRES32=r89, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r88) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r88, 0x0, 0xee00, 0xee00, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005b80)={0x0}, &(0x7f0000005bc0)=0xc) r91 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r91, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r92) r93 = getegid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000005c00)={0x0, 0x0}) r95 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r95, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r96) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r98 = inotify_init1(0x0) fcntl$setown(r98, 0x8, 0xffffffffffffffff) fcntl$getownex(r98, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r99, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) statx(0xffffffffffffffff, &(0x7f0000005d40)='./file0\x00', 0x800, 0xfaf, &(0x7f0000005d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r101 = gettid() r102 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r102, 0x2000000000010d, 0xa, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) getsockopt$sock_cred(r102, 0x1, 0x11, &(0x7f0000005e80)={0x0, 0x0}, &(0x7f0000005ec0)=0xc) r104 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r105 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r106 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r107 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r108 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r109 = syz_open_pts(r108, 0x4000000000000002) sendfile(r109, r107, 0x0, 0x6f0a77bd) r110 = getegid() r111 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r107, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r110, @ANYBLOB, @ANYRES32=r104, @ANYRES32=r105, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r106, @ANYRES32=r111, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r110) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r110, 0x0, 0xee00, 0xee00, 0x0]) r112 = open(&(0x7f00000095c0)='./file0\x00', 0x1, 0xd15dc85595896d90) r113 = openat$md(0xffffffffffffff9c, &(0x7f0000009600)='/dev/md0\x00', 0x106c42, 0x0) r114 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r114, 0x541c, &(0x7f0000000040)) r115 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a80)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000009b80)=0xe8) r117 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r118 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r119 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r120 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r121 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r122 = syz_open_pts(r121, 0x4000000000000002) sendfile(r122, r120, 0x0, 0x6f0a77bd) r123 = getegid() r124 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r120, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r123, @ANYBLOB, @ANYRES32=r117, @ANYRES32=r118, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r119, @ANYRES32=r124, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r123) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r123, 0x0, 0xee00, 0xee00, 0x0]) r125 = openat$random(0xffffffffffffff9c, &(0x7f0000009bc0)='/dev/urandom\x00', 0x300, 0x0) r126 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r126, 0x541c, &(0x7f0000000040)) r127 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r127, 0x541c, &(0x7f0000000040)) r128 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r129 = accept$packet(0xffffffffffffffff, &(0x7f0000009c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000009c40)=0x14) r130 = socket$phonet(0x23, 0x2, 0x1) r131 = getpgrp(0xffffffffffffffff) r132 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r132, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r133) r134 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r135 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r136 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r137 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r138 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r139 = syz_open_pts(r138, 0x4000000000000002) sendfile(r139, r137, 0x0, 0x6f0a77bd) r140 = getegid() r141 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r137, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r140, @ANYBLOB, @ANYRES32=r134, @ANYRES32=r135, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r136, @ANYRES32=r141, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r140) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r140, 0x0, 0xee00, 0xee00, 0x0]) r142 = inotify_init1(0x0) fcntl$setown(r142, 0x8, 0xffffffffffffffff) fcntl$getownex(r142, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r143, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) r144 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r144, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r145) r146 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r147 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r148 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r149 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r150 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r151 = syz_open_pts(r150, 0x4000000000000002) sendfile(r151, r149, 0x0, 0x6f0a77bd) r152 = getegid() r153 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r149, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r152, @ANYBLOB, @ANYRES32=r146, @ANYRES32=r147, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r148, @ANYRES32=r153, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r152) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r152, 0x0, 0xee00, 0xee00, 0x0]) r154 = inotify_init1(0x0) fcntl$setown(r154, 0x8, 0xffffffffffffffff) fcntl$getownex(r154, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r155, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) r156 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r156, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r157) newfstatat(0xffffffffffffff9c, &(0x7f000000a140)='./file0\x00', &(0x7f000000a180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4400) r159 = inotify_init1(0x0) fcntl$setown(r159, 0x8, 0xffffffffffffffff) fcntl$getownex(r159, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r160, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) stat(&(0x7f000000a200)='./file0\x00', &(0x7f000000a240)={0x0, 0x0, 0x0, 0x0, 0x0}) r162 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r163 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r164 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r165 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r166 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r167 = syz_open_pts(r166, 0x4000000000000002) sendfile(r167, r165, 0x0, 0x6f0a77bd) r168 = getegid() r169 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r165, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r168, @ANYBLOB, @ANYRES32=r162, @ANYRES32=r163, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r164, @ANYRES32=r169, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r168) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r168, 0x0, 0xee00, 0xee00, 0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r171 = dup(r170) ioctl$PERF_EVENT_IOC_ENABLE(r171, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r171, 0xc0585611, &(0x7f000000a2c0)={0xfffffff8, 0xaea3e16a1cbe8f76, 0x4, 0x400, 0xfffffffb, {0x77359400}, {0x5, 0x1, 0x0, 0x7, 0x31, 0xbf, "cb79b24d"}, 0x0, 0x4, @fd=0xffffffffffffffff, 0x5}) r173 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r173, 0x541c, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f000000a340)={0x0, 0x1a9fd13e49d75126, 0xffffffffffffffff}) r175 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r175, 0x541c, &(0x7f0000000040)) r176 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r176, 0x541c, &(0x7f0000000040)) r177 = syz_open_dev$cec(&(0x7f000000a380)='/dev/cec#\x00', 0x3, 0x2) r178 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r178, 0x541c, &(0x7f0000000040)) r179 = socket$l2tp6(0xa, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r181 = dup(r180) getpeername$packet(r181, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCSIFADDR(r179, 0x8916, &(0x7f0000000000)={@dev, 0x0, r182}) r183 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r184 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r183, 0x40042408, r184) r185 = bpf$PROG_LOAD(0x5, &(0x7f000000a500)={0xf, 0x6, &(0x7f000000a3c0)=@raw=[@generic={0x4, 0x5, 0x6, 0x95, 0x7ff}, @exit, @jmp={0x5, 0x1, 0x3, 0x7, 0x8, 0x18, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x9, 0x6, 0x9, 0xffffffffffffffe0, 0x8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x21d}], &(0x7f000000a400)='GPL\x00', 0x8, 0x27, &(0x7f000000a440)=""/39, 0xb81709f3e0b0f8b7, 0x8, [], r182, 0x6, 0xffffffffffffffff, 0x8, &(0x7f000000a480)={0xa, 0x1}, 0x8, 0x10, &(0x7f000000a4c0)={0x5, 0x1, 0xffff, 0x1}, 0x10, 0xffffffffffffffff, r184}, 0x78) r186 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r186, 0x541c, &(0x7f0000000040)) r187 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r187, 0x541c, &(0x7f0000000040)) r188 = bpf$BPF_BTF_LOAD(0x12, &(0x7f000000a700)={&(0x7f000000a580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb9, 0xb9, 0x6, [@struct={0x5, 0x8, 0x0, 0x4, 0x0, 0x7, [{0xc, 0x0, 0x8}, {0xe, 0x4, 0x3f}, {0x0, 0x0, 0xfff}, {0x5, 0x3, 0xee}, {0xc, 0x4, 0x35be}, {0x4, 0x5, 0x5}, {0x0, 0x3, 0x4}, {0xa, 0x0, 0x12d}]}, @datasec={0x9, 0x3, 0x0, 0xf, 0x1, [{0x3, 0x1, 0x1}, {0x4, 0xda8, 0x3}, {0x2, 0x7474, 0x8}], "87"}, @var={0xf, 0x0, 0x0, 0xe, 0x2, 0x1}, @typedef={0x9, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x73c380bf00688a7d, 0x0, 0x5f0a21e9e6503bbe, 0x2e]}}, &(0x7f000000a680)=""/87, 0xda, 0x57, 0x1}, 0x20) r189 = inotify_init1(0x0) fcntl$setown(r189, 0x8, 0xffffffffffffffff) fcntl$getownex(r189, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r190, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f000000a740)=0x0) r192 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r193 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r194 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r195 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r196 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r197 = syz_open_pts(r196, 0x4000000000000002) sendfile(r197, r195, 0x0, 0x6f0a77bd) r198 = getegid() r199 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r195, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r198, @ANYBLOB, @ANYRES32=r192, @ANYRES32=r193, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r194, @ANYRES32=r199, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r198) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r198, 0x0, 0xee00, 0xee00, 0x0]) r200 = eventfd2(0x3ac2, 0x40002) r201 = socket$nl_xfrm(0x10, 0x3, 0x6) r202 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r202, 0x541c, &(0x7f0000000040)) r203 = bpf$OBJ_GET_PROG(0x7, &(0x7f000000a7c0)={&(0x7f000000a780)='./file0\x00', 0x0, 0xc}, 0x10) r204 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r204, 0x541c, &(0x7f0000000040)) r205 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r205, 0x541c, &(0x7f0000000040)) r206 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r206, 0x541c, &(0x7f0000000040)) r207 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r207, 0x541c, &(0x7f0000000040)) r208 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r208, 0x541c, &(0x7f0000000040)) r209 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f000000a800)='/selinux/relabel\x00', 0x2, 0x0) r210 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a840)='/selinux/validatetrans\x00', 0x1, 0x0) r211 = openat$cgroup_type(0xffffffffffffffff, &(0x7f000000a880)='cgroup.type\x00', 0x2, 0x0) r212 = inotify_init1(0x0) fcntl$setown(r212, 0x8, 0xffffffffffffffff) fcntl$getownex(r212, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r213, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x221}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x1, 0x0) r214 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r214, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r215) r216 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r217 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r218 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r219 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r220 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r221 = syz_open_pts(r220, 0x4000000000000002) sendfile(r221, r219, 0x0, 0x6f0a77bd) r222 = getegid() r223 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r219, &(0x7f0000004980)={&(0x7f0000000280)=@proc={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r222, @ANYBLOB, @ANYRES32=r216, @ANYRES32=r217, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000f7cdeb51", @ANYRES32=r218, @ANYRES32=r223, @ANYBLOB="00008a9c02b6ba5a20f00e7c0238491cd0ba64b46f7ab094dca3e220a563197ec6427e00b0810557cefc7f1623aefbe7b245587fc96a1d25f6e6242f65ad18c0d87642c9ace4d08ce8ac7355d38b75d60fa2254135c03fbe497ce71550e3b9f971f75f019ca9a3"], 0xa9}, 0x8082) setfsgid(r222) getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, r222, 0x0, 0xee00, 0xee00, 0x0]) r224 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r225 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r227 = dup(r226) ioctl$PERF_EVENT_IOC_ENABLE(r227, 0x8912, 0x400200) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f000000bf00)={0x4, 0xfc1, 0x0, 0x400, r227}) r229 = openat$selinux_status(0xffffffffffffff9c, &(0x7f000000bf40)='/selinux/status\x00', 0x0, 0x0) r230 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000bf80)='schedstat\x00') r231 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r231, 0x541c, &(0x7f0000000040)) r232 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r232, 0x541c, &(0x7f0000000040)) r233 = getpgrp(0x0) r234 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r234, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r235) sendmmsg$unix(r0, &(0x7f000000c040)=[{&(0x7f00000001c0)=@file={0x2, './file0/file0\x00'}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000000240)="87d32e51ba84fef176959cdb185b90a4e1c54041249b150532078364c5c32fda2e30f54b1102f05b1ace7a537a1be50648c0f751194f4c3ebf9b34ec74ba84b9d0dc9645acef65e23f4aff2531c46b78633bee3278b1c95cd1371ba82edcc31465233e35f90f3bdc65ea59352c0b8f8e8c39f5927934a53168f60a04c08770e4bea5c44bb0be86c53adff28b7886d93557e91310fbf93ae96eceb3be9f97024228e6a0d14de4dd836bd00c16c3f702d034fa9bd481805d15df53903d7aac8834a1626bc54cecefa839752697e6fff967eaf568a2a6c5db0f2f174fa01433636f9c893e15a2ab1acc4b815430075c5d582adfa284ff7d2b3ab3ea356169f9eda1731af9999f31b39a8e31fef1a0a4146338ccba7e522f5dc444f9e890216879fde69e537efae03de1f4f8517df9ac842e7afd76857170da1459803edf7837e02f826fafea2a2aeaf13a50369708f20a77ac3e54325db1229e83504f77b35d664e3b2bf23e223474bb03369ca4324e42f25c712fba25d4f71f062872c8c3875b6ad254c2fd54101019522c5a13979dc4c1bd2648f0655ef53f7a3b8c9e4c2f2020e42d5528a598e4e824a78fec948f798728f3d8bfd2622890fdc673e9b6c0db573db89d13e27a471e7271aa6cd76cfa9bfb44ced3185d7de0c97d5a0344e9bfa420b8be7978f43429348abb3e990b3a3f01c17f4f1ec241f589d694802884b8b0ceae41dc57686e1361f7f94e96eed7dce2b57e5bb6634d75a505f29cb4bb58d1b3a47cab3b4fce08b5ca3b765ebc28bb5f6a7852de786a249e5d573530b13319109f6ca75d6e5884795855e091c431fc4258270b18985f6e9a7d03baddb466914ada8f0eb65ba298331f2b67d2430147137c6c16da3839a6c2869b62676129702352bd41bc153011ee807bece4a88da32ac9a6dc4da04fd0b58719cfcd1b57959d536cf4dfca41358a7961bd63b8a8845bd35fceda6ff5b620404fbdc958a3deaa6629d1cf0e3f8d7a57fca0f4454f6891324b164787acaf147c756af34751b941bf907e929f23b8bfbc09d28a1e1f178d33c9ba73b2dda3f8e7495ad59b4d6225a292cd34fc46adc696ed57782a54ecaa6a83c25cb57d4e66f23573fa1f22793e4d7aca47a60b87eacc9cd89bae2243c71c472271175efe20046a50a9c12bc5459d801afdf844b6a5f28e5f918d0a5df9b3236c2489a80b6eaebabfd97e66a5163bf2c63ccc33eea0996fa35ff2179f5e0459e23e1420e7921caf4cd04c41e7e667fb67f7171a2e9f1403940eec90a36d99d82fb2972a89922c5ff324c4d80f13d9b4d00638918920eb1f21c2d79203d3f285c9a50268c486d9f0141ac906e4af4e1182024e2af8edbde4810c0b4a0050da214ea6c62e45b5ec1fbf274faf21bc542f9f2758a0ffdc6f8f0c08b7090fe089b0f5dd88de9df34b5a5601aa3e0344e35c6e52589b014b88d4dee94e237556fd6165305d8c43743a7fa318538292a5487d653da3d3efbf105e0ce0f4ba1dbd0d219328c586d40445cfe1c15b5343fc8696bf16a6419389db42035be4002d86c5ed9fdd3feece8d3973b6e3493ed80c3a8f7bd4939c0a0368fc51adb15b485a9596a9298a41d9f39236245eb8c4ca43dab094310d1cd5b1ce920e09f907a0525ebad9df623bb98cf64934464105a142da40369d0a1ba4e2e70cf1b856c01a683ae4cc6965a72c0724a5fcd62869ddde63003c25489b9ce4b241c3581b101a611c64ebbb3cf5ed7f881f4ce3357c6d530d1cdd64d6d81cc530d90468b5f3daeb63307d4077285586f53e5c28604ca6624c7d90bf1fbd68165509bd0eaa2e9ad6a4b137dd470fbc419a459e368d2dcedc80cf30746fea079a70da74e967bb14c4f05fc4ece953e86c357b515432aefcdd4d8cb3324b7e46910e175a00e172e177c5400972f44a397ad236189fa84626cf1992229b23edb5657a91ebe13836e9438ffceb3051e102fc39dcf770cf2a9a95d560de4f35112ca5906ad1d381fb8ce68afd21ac900b3cda1c1f3ccf34be4c3ed279b8d22418e1ac1a55dbc2509ffe54654665bf461689529ca6e6701efcd7565b0121989d5447c576c705eeedc8c7e137453e5045302db894fe120f9a03f6825c835c03d66a9401831c2e3874d8ea072c3ccf748f606a492524fec941c506b39f3336b5d2004941a6170134bb632098e816239328e44342076a2386158edee8e827b4860840fc7a261c51aa808e7da9fdce75f6a2b4a0f4ba3002c499897868f48f861c8de92f57fb4283095d418e858e42693c10e87291ec6419053ee4b7c4d33393610ef595c14fb02067c31e9d24307ec27f286662efe41ea93f64cadb31c0f43a8f0441a1135a45bdec2bede7a8b76888a4d60a167175712c2d26c4f7127c4a14c8ed2395181d1f7b20d06145122c7156f8c1f3a61a20d138250029ac38e3e11af85c511af24fee5397cc67576ded042babd97647dafb9a26bdb3b70ca191cc764c6d1be1fc4aa2080c173a55543c3663be3e8ff78a4bb762703d151bc44863dad98f3342515617dc558a5c2d41986c9d9c5cff086de7a2ed299d98428399253c6c2ec4c8f584cac23f9730effa4dd4e2f07bf6c0859972008726eee28bc5da334ccfbf7ad1cebe98b7b87374db9871d0fe44e36f2596586ae35604a4db031f0288f979ffc79ba973c333d9bb5c760a11db71ca373007ede6ad9491fa1df460f2326a3001d3ca590711fb788ecb9085e124e2ecadd68eac99ef9a27cb35346a9ad3221c9b2489cf710d9f073bbd5386bc0812279d674e35bf2467f7315ea44f0d7ae5775820ac0cb3705bea6c3b35cf126cda5f4d53ce465e23c167fc2ccdcb5460bc061bd745cd6ea8b93f9e979fb3780757a9f5fd1c87723cca647928cdf40988d7203b11e0267ab3103c69810bad2320f01985dff73c88fb5162b28942b9043af0a4c57f35ec91daf2657a79c8d875829c5c7c5cf496da5c428db24b7ea9d7b85b0ff843a1c8aa746010f50ec7944fc2ac3908a0f5cc88d97cbf27140fcf27a3ff8e24153c978c2647779d8df227b22b6d3dbb0631bf30885212c1a3832a901a1c6d445d4d5997673c123bf8ec695795e70a24bb03cc1ea09a74e0825b17a16e0d1244a91812b6f73129ac5a789da7abbc94ad8789a3d4b0f257cb0ff0e7e8cafea7e9ed186e9d8242041b61dd67cf35e048673d3f554b173a371b2c306f5e16ae7b72a8998b338910a90fb49455702a6bd378914972fa946cb1521be1b37b652aedc2131d97a7439e0f76a69924ecca7b7d3b5ce3194c7bdcbc754d6226a57f720a0cd5cd4bd45562a8cf9f8d6d64deb1387fc11a5baa4492fe060c453f24e29d7e58c7fefca2f19798e1ef81e1681648539a43fb0438e88a7bd53d71a26edff5ef8a5eb8d1211235aa00bf80ac6c84a207fb0bb82ac12abf89fa36b22e93e0ef35333fd1f3fec7b9410c0f77661b0c10dcf2decf4de0be561e9d01d320b5275462dcf27a9b83d6140f4f79f32b15e6517d37da0283f60cfbd604b0797b26a024bb5b4931fc670889aeb3421a02c2599535d8f0daff1c32143d220fc2d09a3966e21b31974666478fc802acb1119340035c520155337bcdb0dcdf431f2f29924607f80160bb809a9ba86ea5a19dbb8d8dc8541048ddbb0e3acf6e1bf5a79ed242d49ee7689689a76548f7aa1c749380debf5dda1c2c6e95bc5fd59c6be1ce21e4cd0fc48e880463833195a6c0be467c8c937c744e71396d5511c0afe38b693f3684647b6a75b84825f3fce0ea95c35ef97bcf829b40cc7374e833427985e75d29688630f84905b38f3a03c30f28b0303d6c9228d6ab5041556c8d8ab94f1e771c081f94a67ac240cf4b2d649622e362605d02d1be027500963b235e481bcf1575769274728eaa3e839864f7d72ca693dee0c28d086285b91a4b52366cab1cdec7d992254a7266594450350f791a6581448a9d1ffdb5e701bb704a5dc45380a15247056b140b2aadf65d3657e1c6dae527f48f81a4356b72f267b75f8c8968ba3576b56d7fe65ffd1356314b83c5dd7f1aa912dd3cb3adc4df8075281a7a8b41fb5168f7664fb57f3fcb1369f2db0b3af45d5e5836891c7014d64c77593b2371694ea69a0bf5b4d87dcbb859d3d055e5bc71e04894b6f094059a415f079014356905519ccd6f952e1c4487c1b0dd639895a829a18ca28e98b296464903340b4eae95339025799ce8d9375b0f6c216567cab74b1a99df634cbca4899e070402d951ebbcbba3e015aaaa96fba40bb5a0721c70814b9e33b969c87ece17256b0d95c8111f9381062a3ffb275aca9d88b72cbbbab862722a31bc77e151092f2f41bae3207c17bb818cfb100be93e89da3ad11e8a2207ee0a172584fb0db0d20766ffa1823dc17e0b3ef521a5a9d2614fe2fdef0d67906c9c18743b3666f31b1dfe436136daa924a3fb3d8ce12d2639aebb8e9d4e53bd2ae21d665b1e0e32991b6e5241ec5ebe13b624b819837bed1515c9b139be5fef77c704eea8ebe6ad0171a398ba5a5848de1e5e55ddfc445dd49a10f3f5c7df6ec83b05528df1e0f3a37fff4866a46cb829900512c9483c06074ab098e22b0a81025ee7f2f999e63f9ad6609beb2f32b69051288840b9857434ca63fb55216e57fc6f538993ded97429f312c9daa3a17995a3e748a3cb42de3fd69b4a015a3af63fd14780ab88b21419bbffd335da4e5fdd346b0008a446e72c1292a117e6f13b1a30812237346a325a59efaf47b1fe959699499bbde8f2e5dd789a45df6310452404c5594073dc167d7e2eaad78232b103d3f55cc47145e00d819f43cdfe56d85e0ba5b6add73ff17ab94f0ed6a3b967c8548f14c39276eff873019546d16e03f47f29161fd1e208767dcfff27ef2bdfd5d7c51845d9376973def1be41cc3895fc8ce23dd652245fd85fdc0c445dbe46bd7eba441da15bd3cfafbaf3a5c4fda24145011ae815bf96422bbb1ae689c51677b63764bdb1f3ba0ff0bb1c0dcc77c66d81e62d2281188c0448ffcd00a6bd3bc6929e6fce1b9f8a528d8ca77103442d1b233b99dfea1445124b254ae035eb5f70dcb921b706971e357f23ca8a81f5e83f408128a491434dec2eece48dd3a1941c2fdb2cb932d875e7facb0b20c9fc9cc95002111a8cff1850eb0e6357fff7914c4e43c0809b3d799e34abe9648fe5a5dc348f6d3e167a750f4e3b82634a16125aeb07b5c19616c9cbb48b6d98f9aba872e07a130fd14248f75f72a2188392ec0e32744abbc9a34358597abf0c8e80977cee4c004eabcd5287712152f41c755c39f7c96f1f04795e0d93ed795a971ae928dbe516632cd3f4ef3e01fce00483115966fd1a9d6302d4ab0cdcf5d846793cdd7ca5df50a45ff42cb2887577661456e5ccd7c32a67dfed27153cf594e0148677cce42c61af0e420951d6f24cddbb6dbe213505e21bf01b8fc2e30775ebb7edbe57ceb3ba9d4531f4951a0ef9bd37863a67c8c1e12a05771850294105fb2b9e0470b96f0a92a70269f9c3a5afc1439140b099a6dd5c6b3feeeb3510be91f5366394ceee4832af57359e07e0c4b3efc2da4834981185fea687a2f0536955863143db0e3fea2cc97122ba64d31e968e4241bb7b38fc02b61fc192a4520628c9b7f1d48cb5be98df20c2870452423f40836a724b1071938bdbd326b5ee514bf5d468deae76475ff5f3175da2c41d14ffe23eb8efa8a8d91ccc68f1d347cd4f077790827c1deb7f6c79527b0b03e404264f14a294eab9870ed2d21d70c941b0fb11e2c70aae154fc6", 0x1000}, {&(0x7f0000001240)="228052", 0x3}], 0x2}, {&(0x7f00000012c0)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000003480)=[{&(0x7f0000001340)="1aa1b133464addca913b012fa4f5bc8c65ad585522b0b228da7183a507", 0x1d}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="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", 0x1000}, {&(0x7f0000003380)="a78f43ac79e36da296c972162550b57ffc3f7f3060872dc627004bd2905c8fe32da1a670d09c0e5459fe90e2dc6a558d5762ea", 0x33}, {&(0x7f00000033c0)="827abc02778c40a7d1ab4ebca0e93ca70a3da962625a801a64382f11c73b4d6b931bd18d9a7c529202411c1015adfd1d14abdf4f0121fc301e6da88c27134518ae3bbee460bc191ae00bad5c917d1665e27ad1cf48f5eff38516269519a83a140db7dba3f9e287a7e00629aa0dddbbf1a560baff1e10bd9222b31a55033385125d7cbff352988d6d212de49afcc6bb0c83813e8dde29ecdaa74339b89c1fb666793f3b6e068112f95c7a5ab1612c1046e13717e75d126f5cf21c3f", 0xbb}], 0x5, &(0x7f0000003840)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r1, r2}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, r11}}}, @rights={{0x2c, 0x1, 0x1, [r13, 0xffffffffffffffff, r14, r15, r16, r19, r20]}}, @rights={{0x18, 0x1, 0x1, [r21, r22]}}, @cred={{0x1c, 0x1, 0x2, {r24, r26, r33}}}], 0xa8, 0x4010}, {&(0x7f0000003900)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000003d80)=[{&(0x7f0000003980)="ba7cbe03b3a87643ff20e77641c562c10edaf82aa79b2f1756c259b6def529d00c23615f3480012fc1c6159b1e9ff9aed1f7d6c5e6d726b9896b88c5a194dcb3efb23609975b646de85c4bf1496f1f775a76d6dfed6931b7f86fdd0cc054b54b439f69cba61f96ff306367e6fdfee532e9cf87616c45744eda2f2231b70835430f9bdc7f5e3ff3c8d95f755c95783bee28ce6bfe10365513e70bfe7c92a822945d77acaab958d3f89efb7888369a3e23dab8427b1a2e24f7e1cd782241d92ae05543b4ca9f741c6a0fb3c1f20a562a22dc007cb47cdd08abbf66dab5632f9c48c060254062b3bd", 0xe7}, {&(0x7f0000003a80)="36bc3674bb7d9ad361a19f0365b1852c8e414bce804ba4f9ac3b1780122dfd0b82bd069529e8466fe32d43f37a8192f8a751d3c347e2a49f7be4ad57a201a4d80873aaf68aec63f11b9c0be6744a95d6c8586a611623928a51c60ff49e9c5819dd3672e382dea5153d2ccde1ec406ec12cbf69fa25827312ea166730a66adc4d716a6fb05c2d2e178b969d5c0f65ccc2f0706ddda8d6e1e98a2192cf422f39b7b4a325d7e10152cc37f30450b8e76b063d6fb0eff357e31e16a7d5383b3b6ea5cd4eb74c404701ef2ecc6dd30a6f227b37de8bc570c24952bd058139d03026aefc456cbb9d618719360244ff3704c91150", 0xf1}, {&(0x7f0000003b80)="fb3aa944b20cc8ea9e0b0cf01d0b763910684598505e43d1c14b8cc477d212530440dfd8c861c34e5ba6891029f597501fddbdd121c12ba51fb900d4770116360146a20781d44b8f97876541c62bd9d91e1e6b69bc37424f0901e2ab0673723f1a6e1781fa75cca5511a777a114a0275cf86871bd521f3084a13c8747301ab90ca3d5a6319f1d44425ec6056376e85ccbc335c6b3d91b29747fc2d35035060998168508f77c0179f8cd02ce15d0e10668c7aceb7af71f9b988cc9ac17d5638018bd1b489d6ce4f68bea044b7f787decf674e", 0xd2}, {&(0x7f0000003c80)="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", 0xfd}], 0x4, &(0x7f0000003e40)=[@rights={{0x24, 0x1, 0x1, [r35, 0xffffffffffffffff, r36, r37, r41]}}], 0x28, 0x8000}, {&(0x7f0000003e80)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000004000)=[{&(0x7f0000003f00)}, {&(0x7f0000003f40)="c16c17ac26822b0bf90c5e4e98870f15bd18a880483dda6be9a80187308bc8deaaaec3dd8d4d5cb92b2b13542c879c508bff35219eca9ea7f71c178770c5145be5a01623", 0x44}, {&(0x7f0000003fc0)="2c49024a80", 0x5}], 0x3, &(0x7f00000042c0)=[@cred={{0x1c, 0x1, 0x2, {r43, r45, r52}}}, @rights={{0x2c, 0x1, 0x1, [r54, r55, 0xffffffffffffffff, r56, 0xffffffffffffffff, r57, r58]}}, @rights={{0x2c, 0x1, 0x1, [r59, r60, r61, r62, r63, r64, r70]}}, @rights={{0x1c, 0x1, 0x1, [r71, r72, r79]}}, @cred={{0x1c, 0x1, 0x2, {r80, r81, r88}}}], 0xc0, 0x2006c000}, {&(0x7f0000004380)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000005ac0)=[{&(0x7f0000004400)="58c231bdc9d88fa8c13745acd5b2fb1ef26e1f7c5266e905d733a53342c2435b02cdc13ffbff23c592470ec8cc5cc368f640579b46b605c0b3f2c67f15551d61b080b50284da4ca77e6cb3196ac5d3c7add98d2c25f715ceb58d23d1341fb8354fde8d8bbdb4ea618bc84ea807689f3bf5c226c1e29f0305862d7d31854999e9d733c7ce3dfa5ca0e729a998988d80680f518d6a76ba1404e5eba516e9f651bdc2d80b80af95e2041d4b85bb89f964729d5f44db9117dd4412c492fb4d550d2b2f836be1ac4eb9ee4946b35cd7c00be60e2d073104218f23df6c366e59b048d5fa25588e00bf7ddfb98251b234a4e46cb0c02435", 0xf4}, {&(0x7f0000004500)="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", 0xfd}, {&(0x7f0000004600)="772755e2f83650f75b437be5628ed72438e109af065d2ff0ab82231a9472c658c6cbadc0abe7a51267919e3e875bfd5c6e15f712fa3e50cd5998b8df4697c74ba946c78f3fdb30173c4f4bf69f7513553af38a21259f4a5417ac8e45d1f88e0795a94b494c98b3979285f81002c12a60997b2bbeb12e80dea32684418dc9bca069f4f5f7917983d167fea6768cc6554c2a9ff6e686320cb69c174ea04890bf8c5d66dd35c909764672b1c7f889a8461b53b57654597a6465c997d75b88d487a25dd6e5b02b28858d69517b89d757e5b06c4c6014173707054c507719929cc610462659aed53551231276de5dc1f479e34e18b1e17e2b4be8204f4388b22a5a160c590a08be5aeb0a14ca016dafad0c7782c3ad106cf19bc295ba8756767a6b1b37fd7305fc5b6a5a202fed04c7e32bb4a10c7f0a986bf38b209598d042a8eb203bda4c666cab8726c87ff047e00614a7042c9779c3e4bf9dc8fd73806ded727b6f02e49893043b48b871ca048b46e195a4f359f6b2fdd931066a74d96eb1bb06136be2f42bc7212ff6febb6a8ea06b0cf568a0464a609351b43ad003151cbda3585d21bd4d07b7a415084745745a88ccac07f43c8a6c43390cc4eab093417f8b016491f1d9192b1cca8ed23a2e246749f321259cf0a28db7729fe342bc5def3d978a06355d65ddddfb505351d35e463927fddb0d07bbf68236087bad5834c9c2a5890765711b4609324fb220fb86d3a2d7eb5012d616745ef812e4a467fd8e9189edd37c7836482913ed6a8419813a65f8b44d5fbd3796ad71afb3e7210a4a1abbeaf21cd4177bf1413ed1081555cf59862dafb0ffb9fd791cb57f0871536b8ccf590f90b013dc1ae043e2d60f4412ab5c79b2eaf5c2f5e7cadc8b5f76519fa86051b404de581041c2a4a8fb356b0d291c0b7edd337c947ac7afde010256eb1553bcf8e0217a77d0a0ff306f782971f797e37e475d975cce51a34d193e03621d75f75140d53e04d5bf04d5ed72bea219062d2343205af8ce424ed05f03ebc4d03de918b6157474f4b51815700812a91add8d708c67691c79f449f19ce293eba49f0432a4167d026834fd0004559e4f1c781bdd60e0d68110a109ab3bf582293179bc9b7c3b5ca4deb0739cbbfc4cadfbdee902eab37f3b947a8a06fd21df91818b516223950e5aa923500d74dc9bed98326ccb70471fff9b4084c783336f6bdcb391366d0beac311431e232eb57ecbed4f7c6a7c814bd671d5679959507b6049a8d07eaf46601c1516b8e15343a20641b4e05b4c6fd1e331d75b75eba4208c49046871ea88baa25df9b8f6be0816feef42eb36bbc4e1173fcd14809e5deba4e1fa7b7b124b98e0153f1ba8d9601f980611cfee043eaf700b3f33de439f2dc5b685e9214e0a4189efcdfdb85e006ef8ba39de2f6316a8c5282f851c2b8cc6b50277ff4bbd941e0e31813c8f66f66a6097ac9441bd115ab60f2d1fae9445d52951810a0db77a0cf24b9f7443d95f5ccb1c529e588c1fc813167d93b65819ec8a4585e51e5f4f905d36e5cddcda5c6719b97e665f69de8c9091b19efd65a8a55d932139d23d8c8e2931ebf2a4c20a061243c704a40d848048bb2428c28a2c431054db22f8e2b2c975ea5e40ecb3da8be058fdf5303ce6dd0d8dc5caa0025d8dbcc22ba6fc3064ebc22470a8638a40747a1376b41971a38533bf1278c0681273a3cd49517be6cfa1fcf882b0ea8fe36f96015aac6671d4417fabf1cb7b1e2bffc7f958c5d3cd5c4ef033b0e82f14aeac57e1c103c655cb9fbb509fabfebab5eb844c7731be51dd8e7866285ff59554febd4ce5f646a855f0ed5fd5cf56ce695988d68ffed416fc162f7514020d2053e8ef307ea44d2d1173da349a6fd446c5242d09066a546e0193bdc92f9304bf6ac30668d3f67186c96b095280d669be6e480cb9beb10b76e7e0f5c58fb2a35304f8c1d5afff9ab3130d9fcb3a962d994533378b006380df6a285ef92fc0e4bfd7da3eee3ddd0dac62ed5ef075653e0d936c0c6caa6018c64a418630ddd33e7c9e4b26ee2ff6174450638703a9372b97faab502da4ad22255b679777de35a775e6dd60f349b3cdfd32a512d15f1c093a0a44b83fd2d95cacd2f0579663d21ebec032407cd9b412439e407fc78e25d3d3343bf55b4a33ed4e0f6efcb508956a07d1b3dbc637aded8332f5cd457aa9fe5280f9dfb8c86108924135062d7b7da9b6ed026099a57d0213c56c216fa9f246ac4e189e7419a0f3586f9a63a83153ced4b5bdde66e735cd6b16c6bcec4f4bbf918520c57d671eb306a4d79d8b8e103d6029cfdfb94dff6f1dd09eef23e43d47e8282e4943dfbcb614bf05593e3f7e708df511508a2959f0a0a77e3fdc8de619fdab621fc4d35c3c5d3cbf2443bd51409b75ac258bd309c9f752dbd238cfdb39e622fbde47280233a3d37a9572f54dfa369e0cef183148bba6a5a422bba0a1c0d3b8f6323b16429580c6a78f70124bd0e3c6eb9cb53502154289df7e1c6004d57c4c7df46b23d6e4762e6165ef70f1af1348ae4e6c0f64a490d3432d0f2ec8fd7d7a75802418b394bc242fed50f56439e2c217fb3a652fd3dcd3c1e0f7f9f69cd4b6b5fbb85f794a5f61b69fd157d807f558a5fa6077dff6bef72aeb0253300d83c03a095598a687abf98e2de44c44e0148f436dab74aec709f79236725ae5dea6bab1a56eb722166b33ff130326f15e9bd1185ec8e72deac7879a3af3ad13c435b1221a56f57ec7f13365476e7091a584c0b1cbf2ba45e205c84611a41a2710aee38165e33cde7fb1d748a061eb722e3ddfe4d18e47c2b647b17246cf0823e74069d697ef7cb22825cf049d527c846098aef7e4701923eef76d259704d550596350d25747164dc85f8410105cf09f8173c7726c24623a1b35dab6640e279c89aabf98dcf31a328900f76bbb0c44d53ee45adb68cad7e6b0c66136004d6cfe9f44267a56cd13c1dca5cd2a5744ca18b45d07f632d56c72bce9a0e07e2df72aac3b304e014493642e052df3e0f397be37df379b0041038529baa1c6d4a78d4b97600e6ffb360d7c40083efdbfb1ef039bcca81a4b4aecba35dbd8546fbdf66c9dacb36f8c7869db855a62ea426b467be87af39089028cc3e9ddb8ef5196b92f232aa4862f32116e4b87dd66d1a0b45788397dc23bb2e3acfb4f4fc76b849f325b576b2827b14bfdd7754d0ab1854e78b0dd51ba60c1496c52d0a30ee02a3895810bfbcdbbb8cc55802bb79168555615ebce0f755e2a50df451b3a5649e0372985a36fa6ba942796deefb06f285a5c21d228b6aeb10d3bd5d82ea41a265bad05a9f7da8d177e0c6d66776ef1a713993de2652fc3308bd0280466854c47b8489f9401dafc6256ab51e9eb4b06d0ee1fa73df4ea7fba11a837f502495b020ebc953bb255b7c019f498424de98f17c90cc72d597809a96065e15913ca1ff4b8a78cd85182a4d2aac4361a96927726c695fd61f652adcf03585f997d844ded969c54fea8b4fde622a8136fe26ce5d49edb9a44b26d1232a3e0d877421a13d82c8593fe43ea2330f2d5f9172f4f63cb9176fecd2d6fcaf10fde35c55f0f87fd5e9912ae62006c10563f105d8635eb7d51bcde1942bdc6c076fdaf5b4971c836827d66c4ce5075599b08d0911c63dab834536667648740340157dddd8f62f63f317e43623cfe4e9e2dbf64faa833426da3df0d9d57eebffd30a2fa65d49c06f67d63f2a03238860a46d99988887695a93757ca135c734620c591c787c3a1b015f78ba951fc8dc672d4433237ed6d056747e4fa79968dbd8298ffa55fa384eadd84c8ac0b53d4cfd7bc224186273e2263bfd05ce9df48b4793f1d8020ba7710a51ef04239924453f262688665c67065418454d3343544b53ee9a7d2cd10a9408d62e973fb52226948402020e1b63fdac5c830215fa65d366d1cad0ad5f084be20c1fe14aa819cfb435aea648f284a52f344da818da1f2896e9d1928ee167687813781df08bec9ecf8d1e4483738af4369ebda06a042918b283c47041fe0e4cf5f5867afbdd38daff17fff2e522a99137c8da92e20b3f65f0fe79a11349eb7146da63861199825aa77ca8523261c66055b4c924fc1afa897b05a261eb5c2dfbf76e161dd6d82022ddb475b6fb63733ca0a71195dd107ab3ed4aeaa1c61dc089460144c8ef15424a53c8e06661dcd952bfd76c1ab123a16055ba8e526a70c7386dbac5e655dc3dbaa0a2490066c6cc148ffc5c52e362411ff649b9a5e88ae217373fd1a908589ed04ce3382e920b6a0c00a992916cd735ccbcaae217934acd634926d540972e14b30e03153c7a16767aa84b6bf5f0afd2f6cff9bb984e1147537e88f98d82a419ed8ab17b0880b5afb4a255dd1c59276d1fb8fd9aa5c8b524c8870ef7ed8498b65c27dfd355f336f43af60d55635dc2d9d7ebed0b5c48d62b2977216a05891211f07b54ef7f8976a893465298452a3d65fe520757ae16c98e59c87d9b2571d11250132b92ab83b189d97f4c947c842f5c3372e322538fe182d73fb88b57b99d055496c9312a4c4941e76374021eae6e01321d5df896b3bb9d38ba8606961de4bc0204c35416daf1ea11dbe327672c1d10afc6f9bec17ca0e1cd63f8a6e162bc4eb84d4a7cdd24cf6b389bb58f8932713476f9dced9e18da4a07d45d346346aa2433388edefa8a073ce3af363ca3de9ba96c46ffeb2748219780dc875f8f8f24f5021ce67221e4b527ab6bb3d62cc0e6ef6ddc253e97e99b59a88ad0fd0cc17b4e0193caffa8c13cb2c1150a110de7fa6c1d3df2b080b4fb72d64715eea01b67828e1d9a83445ecd7b5a5db4c972df983ab8ea4cf77e50e0df10a6be6098d116dc258b705beb21a1cdc4e8861df529aaf9c4d3e79be4a9820e7fdf05b78059bd0a5b4b72d617763982baa00a5b7d62f902f653006a547427ba88b1c70a13b830b8a8bec5b02af88a1be2fd73baf2b1186e2717b7354f6308ede17fe1f10e4f5c4fee544cb0ba24ffed9274759e83f1ed702bf327ec32eae548a149d08e6eae74bb884fea335f6ae23d09ef4067e586f81a79edb6e1397b414f9a9e652c92801c565a1e900041fe0436178d28ea42f1d034fb4bd69c5abcd6dc5edb4d6cee856fc73c511443d09353975a522d7259d407380aac85d292f38e900bf7fa5aa82c0cad6a20532f2a972b762b21a31bef5fee6e4277c922c165a620e9d347425c26e985c56a655578240095817683dab9b04e26952316262490466a44c3d063929ddff711a4a74d9f1b9dcd048d246905432394f63856cf2eeda152f9ec0a1fd49f74f97e5b328fe3db1cbaf0db5a1c34511e2f1ab00663d6e486d3e46098a93cd3c3688142aa62c900fcd26d2e146e753dab8fc2d1769040aba7c71d4affcd4820f74206f53452387c3cccac255bff2cccafb6c8e63880f70af82ae79fe5e675ca32fa1f4d31ddcc3b65631b7dc5dc58bf90bc1d53dd517cf2efc1aa10340a4cff30888245c8a3b11a181f68145ad6af5fc9d6c1093ea25cbaed5b7ba78680b903f83a70997b706caa20724f32349e3933d568e46a0b8a775c3ebc42b28122ab0444e07b38f9eb17868d419cadb9740343065761faa8fd3f137db9206263809c350e4fca5022cee76153078f5ed4de5b8d09fd25045527f28a9e74142a6bd4747cd5b1a280cbab2dfc68fba0bea58cef7cda2de3cb42a0e0c4ba2d61bf3be2fd5b3d43aa8b1be18578b24bcc6a8e9dd2d7cd983c68ee8f1c5b0f7ca162d594b83247f6db35b78", 0x1000}, {&(0x7f0000005600)="e627727a67d204133fd95175f98c66036b58e733f7fa76d7558659e9653897126eb286b5ae8979e386a01d6827140c51946e2fd7ed42ba50f8f006a0487767cd072361faeb80c3a6f6c8baa320b9e9662c9593892b975240b4216bb4c9e0d4ee7e74abc1f7c17b11e7218377ab4fbade9cb00b46ec71e458a2f77846a5d787b8256397b9cc4147b49403c51d55497ee52ec2cda1a97f9730a32a8764e899082aad80", 0xa2}, {&(0x7f00000056c0)="d64937d08fc4032c5b275f15eff79b97d0a583a641d88338fcf2e00c9a5b7364b2462db18397bb39d00c41d52def7f0f1a3d9029f984910cad4e16a4b93f589f5a33b71c276c0b14081dbd30", 0x4c}, {&(0x7f0000005740)="e212bb2ceef3ce3b67daaba1813f9d5dbead7ebc73e3f21f4e67bc7dd284e71378b1ca53aa248c7a74363d32b2790d89f63d0c58c90186bf26d4800550b5bb10487cc5af6b9acbc494b823da78664f75be401d734c26086fa45232e43fdcd35ecf6e8f37c7651bffc6a87cb631eeeb527cf8624dad4384f3c43990569df8720a285365aab3dcf5a1536e05100f548d690c786af01a77344d5e740684d2c666d85e9c34503cb8604f5867eb00dbaf077b0b9e7b349db4be7289b348dee168f91de9dc16ccdfd9267c09f6fe2f84", 0xcd}, {&(0x7f0000005840)="7e2b0dfb12ede1902aadc0dda437c26e9d15f695356512356db138e05ba00886c0434aa30749a31364fde529a8aae0786263aa17b4c12a98fa8a1d4d35265e48", 0x40}, {&(0x7f0000005880)="5aff3e3921ba908492e3c3e55aa5057ad9d79cefacd22d2e4c38dd6f3fe2707e6c31e7d9b7888082df09ce6cccb8cbf0e09371b345d87e5fa4c1175da4ed75f99f333128b4b559681aa58e93a8c142649ce0008181510cf4190bb1563b31d481cf1019da148b2dabe80e1922e24df2cfb8d4062dea2b5c4cfe0923ad2193a136eb4bd0451db55fc09a7e3f2b7aabc6c862e120187dc5c5420da834c1525821432b18f65b800941cd17956e3833135ddf3056086987525ea2c7528d29f0df64eefeee6251d2ccc3d49be08f4fffb16383b0f38a338667b266e5403cf18fb0e5c98b99", 0xe2}, {&(0x7f0000005980)="7fec9666a22941b1055774eece8fad8cad6d2892aa5d872d4eab9a7aa779c456f421ea323d2dc1f618571e899bd7c2711dac70902d3e364a0ceb332c5d6e58287cde6f0479275d7f592000a865b578e665d796269948260c26ec830c08ff7cc74ef53b9015bce440", 0x68}, {&(0x7f0000005a00)="e792016c908e61fbe95a43ec525640ffd87fd220d0e90d8ac79ef2c5cfecfb272cf39d934f4bc95f5e611ca2191f594b99ba5bc654beac619cb4c433f59d5951a2861695d9d5d93a3800cdb5eabbc9391489e990bdcff8a981e97c9391c1e8580a9034f6222986f8ff0680c1b42b76ab8c73dbfc2dc1e3b53fbfc5985244450fa1dae403a441d2d4e4ef6df85c771c539d2828d891fb6d3738aca7144f2be5350543", 0xa2}], 0xa, &(0x7f0000009640)=[@cred={{0x1c, 0x1, 0x2, {r90, r92, r93}}}, @cred={{0x1c, 0x1, 0x2, {r94, r96, r97}}}, @cred={{0x1c, 0x1, 0x2, {r99, 0xee01, r100}}}, @cred={{0x1c, 0x1, 0x2, {r101, r103, r110}}}, @rights={{0x1c, 0x1, 0x1, [r112, r113, 0xffffffffffffffff]}}], 0xa0, 0x20008004}, {&(0x7f0000009700)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000009a40)=[{&(0x7f0000009780)="ed544e11ba88c1e3fbab1edcfb4392e0f8dcc31df3ace21b07f310d2f4935e2cb55382d5a7f063e6ecffa8a7382a74d6283547ecdc52b7096dc12d3091e17f09b15b3723933e8e1a91612b331d29f7567662dcd8ba182dcfb258a4675c12fcfa7afe54f3ee69b149c90cb57e68355c99c7eb69024a4f9192c2733f53bf1160b0a1bcf797cbbccd3fca7833596098f29dcc185cf88bd16a41147ed17b6a8c2e1a0cb72bc50f167c169c6c9b040d957e5e88663631c9d020e4fdef1ae855fb26563fad7322aa59374f6165738049a147d78ee44e713790b348399f", 0xda}, {&(0x7f0000009880)="f65239cd8aeaf2e46c8efca2e4fd5f4821d4e8ae39ba18d9965e114af17ee09e78455cce31b885fdeaaaae86e0cffafc241e9eee45ad79f2b93e4ae77fb95cef58383557", 0x44}, {&(0x7f0000009900)="087b97ff78a6f63b0ad35a7893458290d7dc260bae026d3ed2a1720950c328f9530327f07c91679e35cd77058ac800ff0971aacf0ba1e8eafcfc9448186c569778c7ddf12a3d79303caf", 0x4a}, {&(0x7f0000009980)="cd9ca47ba8150b437b6081f27607105371f9c2a493ef8e377d10aa6dda0d6d60f8c74c2a89a866001d37c939acd5420b6fe0aa44a03f506eb8162053649baf860e5f0180c2510e7d364d9715e5bdebb74a765a51c1c24d76cea8b9440cbc4ecff5a6f54243f9e7c9f89fa5af0ff816ef66f582a4d84ee6f15ec3569ccc8170796402ed98870cbb6698782d366b652d5bd9722f470c3c380c0b8ecc0cd0ab853c80321e423f0293c9dc11c744dade3173478c02de", 0xb4}], 0x4, &(0x7f0000009c80)=[@rights={{0x18, 0x1, 0x1, [r114, r115]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r116, r123}}}, @rights={{0x14, 0x1, 0x1, [r125]}}, @rights={{0x24, 0x1, 0x1, [r126, r127, r128, r129, r130]}}], 0x78, 0x9000}, {&(0x7f0000009d00)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f000000a0c0)=[{&(0x7f0000009d80)="e242d7087d9f57298f44902b917fd459522ba07bb951e456b0fe9fb5f364c09b295f8df3b3bf6a4820dada938c0eadf6", 0x30}, {&(0x7f0000009dc0)="5c362482dbbca2fbcd5f64c7b3331476c44192e43ea4c86b39f133d7f85b82ce58bbdcf29fe42fbd55a13ebc8167b4672a4642dff12d2bc3e74e42ffcbc9e1", 0x3f}, {&(0x7f0000009e00)="4c2608a537d234ff7844e36371494b4b91ddadd3a8cf1c2a2916d2337fe52cde9f58d9dd8e7b65f8d5f4780e125625af742c880ef05569a1b73cbfebb58ea6fee4039d7f2d6d38d2d7f642f62dc775f661edffe2477f363238e02001eed65206edc7d4a67412cb94363caa0cb2aa50a12e6c5a66fb848a24cba828bf33209b4bf193c5ff5d3d4b71264a9176d496859d6ff22066fa8e91a84cc1f00c8f67291403459905438f423177c098db0ec8225cc45aa450c73ee5d371a98cb0dda11253e6e81c9e9f48f6af8c595e323f", 0xcd}, {&(0x7f0000009f00)="d67fd42bbe103baeb81897719b81969e359104cd9ffcf6cc0487b66776eae61e7ee35543220ed871a3806d6e3b7e24bf78ccd518be84b645ec88ffbf615f1a67940e5481f51b5ad3689db44ed639ca843fe415509f755d4b8261a044438fdafbfc310d124924887fe0e974807603a2eea0ab0eb0ce99cd3fef906126a2223b4b984f13420e1a801dcd76b803b1817f9240fdd7109f6e78f50269c7c9a0ac2d2bdf4860c92bf9368742d525d23e26d417cbdd2acb1cd84edc188757f2a196a1d3131148c8480c9b5d1ad97beb0794cc319572644e33f827e002dd682715b17d47aab572d22efcd9b7e322faddbcd3cf11df36baf946", 0xf5}, {&(0x7f000000a000)="a577163c983ab57981a1a646ffc399f1693e1f66d0d1db870209a87c61494d330de9fada48a3fe36f55e21485ecb8e76a05dd9e207f2a33702d49353e2d8013d313fa9cdfc2f31e42ac1", 0x4a}, {&(0x7f000000a080)}], 0x6, &(0x7f000000a8c0)=[@cred={{0x1c, 0x1, 0x2, {r131, r133, r140}}}, @cred={{0x1c, 0x1, 0x2, {r143, r145, r152}}}, @cred={{0x1c, 0x1, 0x2, {r155, r157, r158}}}, @cred={{0x1c, 0x1, 0x2, {r160, r161, r168}}}, @rights={{0x34, 0x1, 0x1, [r172, r173, r174, r175, r176, r177, r178, r185, r186]}}, @rights={{0x18, 0x1, 0x1, [r187, r188]}}, @cred={{0x1c, 0x1, 0x2, {r190, r191, r198}}}, @rights={{0x30, 0x1, 0x1, [r200, 0xffffffffffffffff, 0xffffffffffffffff, r201, r202, r203, r204, r205]}}, @rights={{0x28, 0x1, 0x1, [r206, r207, r208, r209, r210, r211]}}], 0x148, 0x4000000}, {&(0x7f000000aa40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f000000be80)=[{&(0x7f000000aac0)="08fe7720012df6b1a20ff00eae0318ef6ac53530bc9bf02ef6379686e6eb9fd8707b94ebf39972f38c9af7b560a1bd8f81a8f655152dfb273f02ca5d44704bf00c317018479657c5c7e83ef20103c3b48ec43a1f93e057baa52babced75ce0c07be278b2eaa3b2a5e90ac91e2ee567ceda4ec71475e22a135269003a4d9e95ef0e8c37bf0902bb18ecca823f900f4131069a07362c69a4ef52b21677b857b5925628825334e7a3bd7a4f417ee90111a67c", 0xb1}, {&(0x7f000000ab80)="da8e93199ec121dcee8309a6c4ab37de891ddde696c85f5557e50b0724086dc511ea5630bfa9b2f9e7de96fe72f0ffe0f5f7061397f867273c927325da2826cf7e3e46e450729f765602297deff10842e76c8b021b6094c7109685803eda4a8a81", 0x61}, {&(0x7f000000ac00)="d85d0a6e16f0954e628dcb7b6e7e826592e9d55eea6038363de9f5335b181aaf3403c4a42d7bdad61bef1cd148763607080231ac969de6efaa181cba31851a249f7c31dbb255d8687e51d32f79ea57aa60e9ca3b710db4c472f60ae05bc09704c2470e74dc2ae552c2", 0x69}, {&(0x7f000000ac80)="9d3462e853f9607f98ced48bc74cc2951ff5abcdd7a3e748a7b8d051247dc5493d2aca67b668cc1413869b6ca18b8aff35270a7bb28617588c5dfdfcf35ff4a106b0d9fc57f239dd7c801a33c80a13a881a2d5e44f394c9f561327e068d7f29533056c2a2faadd6a6c5554503ffc62", 0x6f}, {&(0x7f000000ad00)="424894a6c07f62742a4ab0e2568c6e69bdbdab2350281d6350e09f148f70964ef764402b246b9d851d8d55d13fc6c438be721e51c00490ee0ebd606aaadd80097cd2aa392392f9f57cf1ceae3751049ca8c846143d6a9f148c7fe0415d9fcacff82c4dd069bc0e614eefee21391ee72836bd33908be0dfcb44422eb4818fca69194ee1f76fb02610e5243f06e1fe7acdb3239eb9fd6e1599ba67fbb8d7189d985ca1ea1e57a5f0e4bfe0bd3764092b76bb72b51595e94b6b6d5e155e9c592a94e56f936237a471f446164e193d75a3e7cdf3867ca4463df32cd84aba736a8430c32b65582d867c127029c000c91cab3dbbc1aed279dcae98452d7a6f0d1ffed7f5bedc452196c121e7ab78c14f9728b69ebc97d525aa81731ba6152543301b02835c7fcc003eac270a158cd6f2188e73358e2ca0807b51a88d4196c29750b01a697d1cd14aa7e327ec81ad604ba0d4871c14ca11605f256c1b561af57eb5904b81f93ae58b946dc9917c70e883440c56d2138de2977a5294e18cca38acbafaba910e1a3efea1d0741aa6d0f930ef0e4dcfab37b75559115f47230e353a3c16947ce826625e2ae9f06fd556188a208fd3a065a41bcbed42d6d469f9d9f1968e469b5befe7f1473f23d4ebafe88d1544813f45585d9ea8b125b8b80c59fa98353aec8f3b94f081702346ef5a4d29109fe6181725c6d8c655519d37758295e812560a9264961a20957ee969ab40b94b49c93fac27a95a351c5d8e883603c185be32325043ae2db1087e700e0509c74ae1f4ffda4fb8aa7dbfc65ad21f9f7f74bb635784c8793fd68f7888f5198858ca551d459828f93bb7fc37782b7d0fa15f8017cfb0bb8b90c2d44fb6cb387081ec1e4d082d1c8a0da8f8beaa3091ff581a9304ba123fb14d35ff7022375e09fe70f2b92daf60db438f8fde317a117bd6b0f98b1f79e55b494e4f8d5015d246863ed9bf5dc2fc64cdfe3e766f5017b4b854f08700ed360ed8da4e91c5c28b32f8d9bec403cfeb7ac7d1138366029f3178587f5dcf203cc80ec4b9974af8bfed577566e85d8b493802051a2b8a42a83266c6a9fb8803367c6cc8aa14315a6fda8bc15fcec9c0a8f980658c02ddfec84799e4df2e38d20f5e4dcc296373dca27478656c8b26b8cce8f56ba53457bac879744c7aa42064337c3f268f2fef1ad2e9bc2ab1762406564155ee6ed4a6026526a757a24bdc21de498ffdd9e4e3f1edcda7c9151fd36686e1351136eff5ccf17ca19cefa2a987f91dc9b9cf02d336078418e68dc892e7b3bf2d9edd8cb1b8f9f559af8a5c374980ab8226b67c60dfdb5d1bab37159fea8b45bb6ebb6ae36b0a50fc168a5bb897a887f93ac8d0f2e0389bf8c4aac29b8dcfcd892a6e301d90fb37ecf29450d31e0eea1c98462d2a36fbd02186a64f0907d792221f2400bb592df9296d09e3d184eda762ecf68a01e15a3252f59a49612d1e0169ae9f7e7e2a3460711a08fa29b8a79941bf8860ed8de7565dde651e749130ad07fff2e21b7f359c0dada0591a614cbc69658eec24b108f28a133293bc452b0b4395772c67659d68d1ce81bc09889c7162ea6d573e51421f71f120e1f703cb387eab5a676c1af4af5265fc486f1715b4933d90a6fefbd6b8c68291ee7cf940a39a88802ad5f3d686f8d449e54d5a60f296bc176582ca4152bfaeccd0f45f43bc627f5e2ea8ddef7cbc9cc207c65b761b088fbe72361cdb8b3d1b649288d522b530f1f9720183e091b58cc865d5da3f1d02899b90677b99faa7dfacc10033f95279ac7778a73bb2d2801a12c6c8ee6221e071ad75158d9fb438032c67a5cde9bba6a16265da18951287437d9a36973cf6dbb83f6441095c2c3a2fdf0bca15336f6b5442ee638dbf5faedd3b353fb15a3f72c0973cdadb6d8d117396fee4639a4fc28391192ecce46fb8330fbb96f2c197d4eeaaa987d63f282a319c4a7cb1821cd6eeed4b560699dc03512059b406621804a80fce440e8e6c14bff022003cff0a1f3972e861c6754a044027b153b07580ca29b86f44a8dc92b1aa4b6eeba49cb6e10591bd68e7f1e9aa62faa9f1d2a9d2ba3b64421f95aa9646d2bb966d4c3dac2d3f7fb43e27987d282cbd0e1a82f2ec6ffff4cda90807f87743545b4c889a6cbbe0164d486171f2a9323be30b80de7c783028d7578399cd7db830b1b054341d909cdc90e020de9bcbc25ee4ff4e55e2f66e71544512b38ed7320519280665c52149e85df43c41491fce7fb22ad8ff4f07b1816d255f5de0e6552c443c17447c5f96c1529608d497fa1b566783d20bfc3cb80e92fb89ff3765527c70e9b4f32b46736c28d4bb37b043322cc603244bc3db5f4fdad83d5cf6ba697094ebe5b36918f78a2b4d7aab9b19b5180b844df96970ae25979a6ab8ff5e37d3e3f77ebcb915415620d4e211ae60326654f68815fea14f5cd00eab0663daca44f1acbd0b287e15a2d05c1345fcfc421a2bad8300d0eabee67daf14e05effb91b39075a258c74ef2ac9c07f8f00cdc128a2b6ad7b3029d346981789b330a1750230434e3d40fcd75fd1b447ff556940bff60d276f3dad4e0e12acbbac1bb62f55e7b9210486d4efe073d825a4681aa097dbf46723684ebdda50d98e36e928cb907fe5232a79fc7e2929a9d831defaf81bf5339e3924ee0c0bd7e035bc0c9a2783fc356c8db19e9e1ee9ab909b877ae2ecb30725abcee386d8ae3231e772e0223ef6db3693b6181e4eb268979d0bd3f69eb0464525252aaf346506ba07bd0fafb3fc6f1e9dbbed01c854647eda71336df26ad5b81690a7bfebddf7140b3ce0fd7ce30679a4ecec8e9ab3d6a8880ab5fa24f8f70fd510d08de3e6dfea8059bbec641b67ad8d20095da64843245fe49f266b6eea7ddaf0b62d5e6f719d1140aa192f144653635d36bb90ae8009735d939b1ef403ed21f77b60197f665ede462725d62d424ad39d7c2c024d394538d448733e6f69ac0d7386c8bc8a7ce01e1bac6ffce4638ed4df48650a22b14a80e01b64af9c00c39fa3aa255581ad42a5af962aaacb4967bcc9c1ca9debf7bed188cff90c824a8b4f841f10f364fb5e1f73b980fc15b96cebcd18cce3cdea737a074160d468cedb869a689a8b7411c5778460003bdac78ac185bbeb02ca6dda5202d8651637ce7b1bd974fb93c3dd63b53fc3b0dedc1fc8e35d0414e7bf992fc54e6e0cc37f08523c7f4b3c6972f0339e4273258f10deab79ee075bb830608b86990fd4f8e9696016fdcf2ff440b2fc24bd1c730962eda636f0320c4d3351834c7272116e269c5c5104ac928b9f5a876d4d28d78dcbb10e159f0c1e317593ab5bda88425184b0431bbd5c62a9b26219a3388e63ad45ca8f388263b0927d090be1ecddd512b291dfbffdb28efd21ac657a22551e94f3ea3e049b7a09f609c9ad970fef5620b8f3b9a46918cfdc4aa6a3da87b724e0c6a34f1124740083cb8aa0c73a13515bf07cddd43a8af21cbc5b215ca3d3d1e0b98cf955831991c3344c43a4727c7bf56e7900afaf92c7c2e2ff2ae7ec295b624ba35c2cb97793e43f5479ea3022b063e501ca97c7e3dcc21af081a1a670ad029fb69b09559e9aeed10a8e3e723811d5d65504d1a39d3bc0beeb67489548c2d06708061c03ff978358bf8c6d572b0fddde1b0437ddaf1dea44485cbf2c6feff5749f41483e9346466147e29122484dd085db871fe62df0041160130517c7ed5eb8313e63251a02aaedd7c1fe435ef9d298c2a47fefb0c21f031b1b4c8c050de95805f53cf5b8423d7d2b1fc30ebd741397e00b357ffc94885d68a7f3bf35c5846302c65620961b1d168fdf7723fbf5934972b1c297ec308affaca9bb73aa0f35be7e51bc1d9f9415ce06db017807826de17d2b9cffa86e137077f2f23a9d27473ed636ca707a2fb2baa1d0b2b7e536deadd6f3e04cc96bf7e09d73eca4b01ec51d52ed98b093c7a9ad8e6b88e2064515d07a3d3671ef290e009782129f7274ec9d6017898d8f9f062e993e6a21fa5ff99fe323e090ff935a60bc75cc310709ebfca7ff613bf197dc83740daa2e38336ffdc7dcc1947afcb93695e6240448d75dae3054752641e521659ce6ac14ebbfd6c719483b33540f435deafb7f1bb6685cbf3ef995b1fcfef57087678dbe9d733386b557fae88844e29704986debe54a40c5a5f5ab429d2d0a1c09c3817b02864934a71e84b3833fcd7f3033170686a93b5dd8ab3426477eae940a8d959948bcc2c79e3e4e6eab9cb6c23381fe57979c76581f81c717099e77dc1e0f01e191bedf3af77a9fe2405679595d7b586adbc6fd81fce817544d4c36828065ae00f50b0e42fa272723a3af8305ceea0e5bb4e7ffa2cacfc04f03b35e5a433bf48e1b68e2659e0fc71b5452820658812a937d5dab9dfc0fdc5823e3d2afd9a7a5eee16befedc73fc64417b3b1cd0415b31bdb3bd22699d0315f2e69cdc4c4d3585d151eadb2b202f7136201a40ccde57bf5d7bc27dece354b3bcad86702ea5753ab2a944777c375d644cee6433dcd4694fdae93e8d3c7fd958d2fcea6297995bab539b5cf1b4dc5dbd832a23e6a2f0edb4968603e7b720b439fb52e2da5412f7676ff5941fe02579be4e86782c9af56199ba63215c8bdda3307b1e81ae2e1f690bbccab3356645501c3ac92fce08411ce36a61521e2014e9b35fd5d6d0838d59e54606f0f7033be7f0485d84ce32b3cd958102bca8d93b644c7b8b87d8ae1d06316de21c87ccd66cf68bd1624d64c357692b663a6b89b6880414a060c23d70b3810ca5b0a8291dc5ca6c31bc47022c64b550ca68842da60ef5a0bc16040388cf7ba60f10b4c63cf4121893c6a6446d673cbd101bb0eca3c8f87b3692f3d4b37077654d15b0a02aec64bce25382377b6885ab41691ef7724b1c8dcab69b74b7874cd301d90afaf89921089e9053b0f9e9a028d96630070c3ec1cbe5307da51db23c6083f2858c3ae3e98aef98b17a0c14a2ddf5c187ff7970997e2ded709313d15b70fdab9ca20b7c3bc4c937f1f7a4ee275060d70d94c10989ff1b6ae05a4058cd0bcf04ac80086011f75cbdd9e3b50db25fd9bcde81c67e4c782346c5670c1d62214d3f368cbe225f0646f7ab10cdf27fbb2547ae8fe957ed80735f342e54e170750969e9e333b4ac198c45f6a9e2f7513d6c7dd066aa931aaf3fa9d44d5d1c641601be983690283930a8fc62f2a47e8aba15f93d61c231f45d4e897ad9f3b658e34b4675a1e9157e4da356f88bf75cb84d4006f581adf06ea2ea0d412cb1ca46ac6a403582e3d69c87b8e796dccff9350080343297fe1e8c07a56adca0f68fbb0213b49160267d64f1e6260d4c0cdd1fb83301ef78e0fe9087016fc756ff46c75c126d4dcf5cddcd77d251ca44fc63bc44af7ad81c8b644f28af2bcf8b535041c2ad629bd9e27e8ca412f21dd147f4ff531fb6bbcd34425b74da2701fcdb2c6db7e3e9ad040b74ccd2f05fe1cad895c7d552a9bb042ffead7d87e515ca89c9bf4a6e5abdf3eff592a6a03167753b485be1d71789fedce71481f05cd983f3d83d683e63811c5eaadb7823fddc981af29d66d2aa87c3aaec93c4b881aa7008e5ec6cd6adc613ceb8cdd5cf9bee4e316cd1cf1da6d03c29fd2a2eae6584693f78695e0de8201347685ca06f311f7d81672b1114fe6deb91e98748adcceb2fac4b9f441144fa7f9c10271fde4bbf4a08234cdb2dc49135292ef89b84ea0ab0cc74426cddf3a20a5555ab72da83a732cf74f218b52154b00a695b883e7dd671dc4936be2daa75d", 0x1000}, {&(0x7f000000bd00)="cddb902dcc964f3891b28ed799808a44a61e490a73b93846573459542e6b12dcd4b1d9ba11e018dfa53797be9168494e2fab060e305ac3416b570ef4bb6805bb366a589eccaa8a11a10116bff7efd69e4ae01809ba7de08542ae673a7925efeee713fca409e81a63817251ce5479aab230ebef964d8a57d23ea96093735f5f9e2dabc63926862889101b4853daf7bac494134f3ba332fb1d1db29079a03f0d606b664a50f776090b5d5dbee4ecaa662178c4a438e7c89e57d3ccfad250e03db1a203510cf9fa", 0xc6}, {&(0x7f000000be00)="54d5ea6ccb1906d75994925b2f06116881193768a5aa76c9bf27d75f21d74b18263c3755ffac3f895801bb0590d06215c58fab4489696f1146fc55a966b0149b6f2604273ef21b4124895a3c3592ff59ccfca4d90057d963097f1e", 0x5b}], 0x7, &(0x7f000000bfc0)=[@cred={{0x1c, 0x1, 0x2, {r213, r215, r222}}}, @rights={{0x20, 0x1, 0x1, [r224, r225, r228, r229]}}, @rights={{0x1c, 0x1, 0x1, [r230, r231, r232]}}, @cred={{0x1c, 0x1, 0x2, {r233, r235, 0xee01}}}], 0x80, 0x600c101}], 0x8, 0x48000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r237 = dup(r236) ioctl$PERF_EVENT_IOC_ENABLE(r237, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r237, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f646c3e905e000000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2559.036416] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:37:33 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9201000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2559.036424] UDF-fs: Scanning with blocksize 1024 failed [ 2559.039995] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x23000000, 0x0) [ 2559.040200] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2559.040212] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2559.040220] UDF-fs: Scanning with blocksize 2048 failed [ 2559.044626] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2559.044806] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:34 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9300000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2559.044818] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2559.044825] UDF-fs: Scanning with blocksize 4096 failed [ 2559.044835] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2559.303287] ptrace attach of "/root/syz-executor.1"[8073] was attempted by "/root/syz-executor.1"[7585] 08:37:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x38010000, 0x0) [ 2559.477906] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:34 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VFIO_GET_API_VERSION(r1, 0x3b64) mount(&(0x7f0000000240)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='debugfs\x00', 0x2, 0x0) [ 2559.480088] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2559.480103] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2559.480111] UDF-fs: Scanning with blocksize 512 failed [ 2559.483414] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2559.483642] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2559.483657] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2559.483665] UDF-fs: Scanning with blocksize 1024 failed [ 2559.484572] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2559.486886] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2559.486900] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2559.486907] UDF-fs: Scanning with blocksize 2048 failed [ 2559.487446] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2559.488049] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2559.488062] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2559.488070] UDF-fs: Scanning with blocksize 4096 failed [ 2559.488079] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2559.881303] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:34 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9301000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:34 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='pstore\x00', 0x2000000, &(0x7f0000000200)='udf\x00') [ 2559.881760] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2559.881773] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2559.881781] UDF-fs: Scanning with blocksize 512 failed [ 2559.886524] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2559.887046] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) 08:37:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xf], [], [], [], []]}, 0x585) 08:37:34 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000]]}, 0x120) [ 2560.219404] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2560.226225] UDF-fs: Scanning with blocksize 512 failed 08:37:35 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9400000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2560.280873] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2560.306592] UDF-fs: Scanning with blocksize 1024 failed [ 2560.371846] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 08:37:35 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]]}, 0x120) [ 2560.413669] UDF-fs: Scanning with blocksize 2048 failed [ 2560.414530] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2560.414545] UDF-fs: Scanning with blocksize 4096 failed 08:37:35 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f00000000c0)={0x44e7, "d4dfdf893f56dbc179105421e04c83ce3becabc97fc60c687929efe41e9e11e8", 0x200, 0x9842, 0x9, 0x4, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="d2bfa8ee5cd31f19ba250de30a6931f07c073ff87d8a5a1c819d8d6a2bd02c322d0a8e4a93ceb107554582dc061707000000000000000c8676f7e427b14fc9ca60cb105103af0bb4cbc6042e9a78b88d68eabf6aa76ca1af9383a0cc157f6013f7e94282c6001fdb48e4c149"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:35 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9401000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2560.669442] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2560.728198] UDF-fs: Scanning with blocksize 1024 failed [ 2560.795871] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2560.850851] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2560.881407] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2560.896619] UDF-fs: Scanning with blocksize 2048 failed [ 2560.911436] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2560.935113] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2560.999005] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2561.020036] UDF-fs: Scanning with blocksize 4096 failed [ 2561.038137] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:37:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x3f000000, 0x0) 08:37:35 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00000000000000]]}, 0x120) 08:37:35 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) ioctl$TIOCCBRK(r2, 0x5428) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x18], [], [], [], []]}, 0x585) 08:37:35 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9500000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) 08:37:36 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000]]}, 0x120) 08:37:36 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9501000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:36 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0xc5, "86a68be22b8b3b755eccc3b5db555796ebc17b1375e878646acdaed8421b0b35c8b981b0e224244808c0737055937038f80dbb6b8dc3239eec5002fe33fdc252bf247f2ec6bd533c898e2165510a6a5d170053ca79e6bf7aa9f9f83a718869f611cb9c3ccabb6ac0e97b1d8e8c554c586bdae72a297829b3b3b2752f1db3a11c4a120729dca957f3efa73386188f51e14426825c08cb813391e19da5c41e8edfb1daeb406b3e2d2402e2c8157d932f61f7eea559bebec06fe9366e754164ecbda320d1c6a3"}, &(0x7f0000000080)=0xcd) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000100)={0x6, 'vcan0\x00', {0x3ff}, 0x90b2}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1205531, &(0x7f0000000340)={0x4f, 0x80000001, 0x9, 0x7, [], [], [], 0x6, 0x4, 0x6, 0x8, "ba5b363c54042224d16e3c39360e2477"}) socket$netlink(0x10, 0x3, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c6230004edd70e28151bd3c1789573f4bc6b14c54be72277bdfc07c7cc6a0c6b2f34c7be5c0fb228e19549aa11e44c1a791f35612d2f598e455a5d53a29c665d5f0e89044cf53"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2561.215865] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x40000000, 0x0) [ 2561.215876] UDF-fs: Scanning with blocksize 512 failed [ 2561.216219] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2561.216226] UDF-fs: Scanning with blocksize 1024 failed [ 2561.216436] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2561.216443] UDF-fs: Scanning with blocksize 2048 failed [ 2561.216985] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2561.216992] UDF-fs: Scanning with blocksize 4096 failed [ 2561.287057] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2561.289075] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2561.289090] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2561.289098] UDF-fs: Scanning with blocksize 512 failed [ 2561.293748] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2561.293975] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2561.293988] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2561.293996] UDF-fs: Scanning with blocksize 1024 failed [ 2561.294515] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2561.296017] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2561.296031] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2561.296040] UDF-fs: Scanning with blocksize 2048 failed [ 2561.298604] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2561.298770] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2561.298782] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2561.298792] UDF-fs: Scanning with blocksize 4096 failed [ 2561.298803] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2561.668413] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2561.668425] UDF-fs: Scanning with blocksize 512 failed [ 2561.670874] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2561.670884] UDF-fs: Scanning with blocksize 1024 failed [ 2561.679409] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2561.679420] UDF-fs: Scanning with blocksize 2048 failed [ 2561.679714] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2561.679723] UDF-fs: Scanning with blocksize 4096 failed [ 2561.700392] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2561.700685] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2561.700698] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2561.700706] UDF-fs: Scanning with blocksize 512 failed 08:37:36 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9600000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:36 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2561.703521] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) 08:37:36 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x120) [ 2562.028785] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2562.053448] UDF-fs: Scanning with blocksize 512 failed [ 2562.096244] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2562.105496] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2562.114574] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2562.122415] UDF-fs: Scanning with blocksize 1024 failed [ 2562.139985] UDF-fs: Scanning with blocksize 1024 failed 08:37:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1a], [], [], [], []]}, 0x585) 08:37:36 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9601000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2562.153624] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2562.170855] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2562.185245] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2562.199983] UDF-fs: Scanning with blocksize 2048 failed 08:37:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 08:37:37 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]]}, 0x120) [ 2562.257810] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2562.268792] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2562.290116] UDF-fs: Scanning with blocksize 2048 failed [ 2562.321635] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x48000000, 0x0) 08:37:37 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9700000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 08:37:37 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2562.359733] UDF-fs: Scanning with blocksize 4096 failed [ 2562.365517] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2562.365529] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2562.365536] UDF-fs: Scanning with blocksize 4096 failed [ 2562.365545] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2562.654283] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2562.655072] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2562.655083] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2562.655089] UDF-fs: Scanning with blocksize 512 failed [ 2562.660578] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2562.660782] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2562.660794] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2562.660803] UDF-fs: Scanning with blocksize 1024 failed [ 2562.664981] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2562.665160] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2562.665172] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2562.665180] UDF-fs: Scanning with blocksize 2048 failed [ 2562.671012] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2562.673298] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2562.673312] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2562.673320] UDF-fs: Scanning with blocksize 4096 failed [ 2562.673329] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:37:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4c000000, 0x0) 08:37:37 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9701000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2562.852953] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2562.852966] UDF-fs: Scanning with blocksize 512 failed [ 2562.854842] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2562.854851] UDF-fs: Scanning with blocksize 1024 failed [ 2562.873161] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:37 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]]}, 0x120) [ 2563.136822] nbd_handle_cmd: 74 callbacks suppressed [ 2563.136838] block nbd0: Attempted send on invalid socket [ 2563.147529] print_req_error: 74 callbacks suppressed [ 2563.147538] print_req_error: I/O error, dev nbd0, sector 64 [ 2563.165305] block nbd0: Attempted send on invalid socket [ 2563.171694] print_req_error: I/O error, dev nbd0, sector 256 [ 2563.183318] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1b], [], [], [], []]}, 0x585) [ 2563.250041] block nbd0: Attempted send on invalid socket [ 2563.255717] print_req_error: I/O error, dev nbd0, sector 512 [ 2563.262269] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r6, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2563.315909] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2563.372045] UDF-fs: Scanning with blocksize 512 failed [ 2563.423068] block nbd0: Attempted send on invalid socket [ 2563.428872] print_req_error: I/O error, dev nbd0, sector 64 [ 2563.436354] block nbd0: Attempted send on invalid socket [ 2563.436374] print_req_error: I/O error, dev nbd0, sector 512 [ 2563.437177] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:38 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9800000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:38 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]]}, 0x120) 08:37:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r6, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2563.589805] block nbd0: Attempted send on invalid socket [ 2563.589826] print_req_error: I/O error, dev nbd0, sector 1024 [ 2563.589886] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x68000000, 0x0) [ 2563.589899] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2563.589906] UDF-fs: Scanning with blocksize 1024 failed [ 2563.590236] block nbd0: Attempted send on invalid socket [ 2563.590252] print_req_error: I/O error, dev nbd0, sector 64 08:37:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r6, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2563.590442] block nbd0: Attempted send on invalid socket [ 2563.590456] print_req_error: I/O error, dev nbd0, sector 1024 [ 2563.595199] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2563.595512] block nbd0: Attempted send on invalid socket [ 2563.595531] print_req_error: I/O error, dev nbd0, sector 2048 [ 2563.597488] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:38 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0xfff, 0x6, &(0x7f0000000580)=[{&(0x7f0000000300)="22d4250cbd21333d9aeaad5adf04ee25e9767aa5825f135d12f07e8c77b2758984b0d217cfe11459987ffc8c2db8f1e3f5337cbb1608b284febb3373584c06d6018841318e98640b114d32a4ada5de05d9435de797f30be61f62e295dd96e80ebcecff3f28e76ae66f168b267fd53b46fe87fa234afae458f9da87d80e4b5f670674910eaf6908c47400cdef1f0f42ea741658a6b82c91a8923d94da0a6ea2f8b192811f3d5eb948140a483d785e48b0bdb896a31c8c880a8f12d8c6bf", 0xbd, 0x5}, {&(0x7f0000000100)="2ffb99782f1f6b22fad34507bcfc6a1a49f7c371bebbe82178a37f0bb752e166a5cd43572e", 0x25, 0x182ab124}, {&(0x7f00000003c0)="1f2ddb7ea7cfe33276ad36c78f507c8d30de0cfeb04598f977a161d12715d8805a6ced56f787cdb2df16330375a91bd30f58f8326cb7221af2a18cd6ac202b140d355efdd07aaf8bd5edb410f041d0a931d4040052c85734ed66c863a3325b18223346dd3980f41c771978d91a97752048804e631b44da2fbb9b3d7a3dc655b74b4113ae64a68f53367fcbf09ff5f9c94a5123632949499b787d98e5a050429ca6173d16fe20738a04077086852e07b2018d506f65c94ae5710b82a9653ad76299f33eb1a25f873068f38a1cf8c9869473faf619de6fcec706c456b037f1999087107586cc40cae1", 0xe8, 0x7ff}, {&(0x7f00000004c0)="ed87df342b881dc08d2f9a37b50b240775af8ca76078790c4fb4e66b71edc1ae0818368651e0eb05a8f84625a98d78fc0513f08625f912c1707cd6da3d163a4d445757ce4895bbc2a3f848d4c533c00adaca409eebb877", 0x57, 0xfff}, {&(0x7f00000001c0)="8af074bb35fd72e2baea9f69abde", 0xe, 0x1}, {&(0x7f0000000540)="3811af4124ea38c93e183a5571e1c7e6dbd421653e614f943df87f5cdd605499d152e23124c12a10", 0x28}], 0x2020800, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:38 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9801000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2563.597502] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2563.597510] UDF-fs: Scanning with blocksize 2048 failed 08:37:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6b6b6b00, 0x0) [ 2563.597872] block nbd0: Attempted send on invalid socket [ 2563.597889] print_req_error: I/O error, dev nbd0, sector 64 [ 2563.603531] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2563.605575] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:39 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9900000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2563.605588] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2563.605597] UDF-fs: Scanning with blocksize 4096 failed [ 2563.605606] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2563.863847] UDF-fs: Scanning with blocksize 2048 failed [ 2563.868693] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2563.868703] UDF-fs: Scanning with blocksize 4096 failed [ 2564.031956] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2564.033748] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2564.033762] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2564.033769] UDF-fs: Scanning with blocksize 512 failed [ 2564.043101] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2564.048033] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2564.048049] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2564.048058] UDF-fs: Scanning with blocksize 1024 failed [ 2564.057860] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2564.060038] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2564.060055] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2564.060064] UDF-fs: Scanning with blocksize 2048 failed [ 2564.065776] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2564.066677] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2564.066691] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2564.066698] UDF-fs: Scanning with blocksize 4096 failed [ 2564.066707] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2564.399616] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2564.399634] UDF-fs: Scanning with blocksize 512 failed [ 2564.400068] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2564.400078] UDF-fs: Scanning with blocksize 1024 failed [ 2564.400327] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x28], [], [], [], []]}, 0x585) 08:37:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:39 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]]}, 0x120) 08:37:39 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6c000000, 0x0) 08:37:39 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9901000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2564.400353] UDF-fs: Scanning with blocksize 2048 failed [ 2564.400574] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2564.400582] UDF-fs: Scanning with blocksize 4096 failed [ 2565.111571] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:40 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9a00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2565.112564] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2565.112577] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2565.112584] UDF-fs: Scanning with blocksize 512 failed 08:37:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x70020000, 0x0) 08:37:40 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x4000, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r3, 0x2000000000010d, 0xa, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r3, 0x8982, &(0x7f00000001c0)={0x1, 'veth1_to_team\x00', {}, 0x8d40}) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000180)) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) rmdir(&(0x7f0000000380)='./file0\x00') r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') setsockopt$inet_buf(r2, 0x0, 0x2f, &(0x7f00000003c0)="dc9354d3e00a1f85fcb1d680c8f3f4681fefb2eccf11580fd972", 0x1a) sendmsg$NL80211_CMD_GET_KEY(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000200000000ffdbdf2509000000"], 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x3051c400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, r5, 0x300, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 2565.114484] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2565.114851] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:40 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9a01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2565.114863] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2565.114872] UDF-fs: Scanning with blocksize 1024 failed [ 2565.114911] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2565.114919] UDF-fs: Scanning with blocksize 512 failed [ 2565.115272] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2565.115281] UDF-fs: Scanning with blocksize 1024 failed [ 2565.116277] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2565.116286] UDF-fs: Scanning with blocksize 2048 failed [ 2565.116501] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2565.116510] UDF-fs: Scanning with blocksize 4096 failed [ 2565.119207] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2565.119601] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2565.119615] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2565.119623] UDF-fs: Scanning with blocksize 2048 failed [ 2565.120514] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x3e], [], [], [], []]}, 0x585) 08:37:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x74000000, 0x0) [ 2565.120894] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2565.120905] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2565.120912] UDF-fs: Scanning with blocksize 4096 failed [ 2565.120920] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2566.123876] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:40 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]]}, 0x120) 08:37:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:40 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000040)) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000001c0)={0x1, 0xa, 0x4, 0x46bd3e1807779f20, 0x22, {0x77359400}, {0x4, 0xc, 0x8, 0x0, 0x80, 0xe4, "4838d17a"}, 0x0, 0x4, @planes=&(0x7f0000000040)={0x4, 0x3, @mem_offset=0x40, 0x3}, 0x20, 0x0, r1}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f00000000c0)={0x10003, 0x0, &(0x7f0000ffa000/0x3000)=nil}) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000100)={0x6, 0x0, 0x9, 0xdc, 0x7}, 0xc) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f750080427aae8b4ce1afdfa784d7d5d74ba73122a3d66c6465762f6e756c6c623000a6c10b7f635a532fd1b2353b01d17b14180855b862e9fd9b1717797e851be4881921a9d220bd755e915ab89d00"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:40 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9b00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2566.163061] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7a000000, 0x0) 08:37:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:41 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9b01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2566.189726] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2566.189736] UDF-fs: Scanning with blocksize 512 failed [ 2566.210669] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2566.211006] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2566.211020] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2566.211028] UDF-fs: Scanning with blocksize 1024 failed [ 2566.211605] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2566.211932] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2566.211944] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2566.211953] UDF-fs: Scanning with blocksize 2048 failed [ 2566.212419] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2566.212576] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2566.212587] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2566.212595] UDF-fs: Scanning with blocksize 4096 failed [ 2566.212604] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2566.569693] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:41 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) close(r4) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f00000001c0)={0xf63ffff, 0x4, 0x2, r1, 0x0, &(0x7f0000000100)={0x98090f, 0x400, [], @p_u16=&(0x7f0000000080)=0x5}}) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000200)) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:41 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]]}, 0x120) 08:37:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x9b], [], [], [], []]}, 0x585) 08:37:41 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9c00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2566.918567] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2567.000028] UDF-fs: Scanning with blocksize 512 failed 08:37:41 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]]}, 0x120) [ 2567.041844] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2567.080022] UDF-fs: Scanning with blocksize 1024 failed 08:37:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:42 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9c01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2567.145739] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2567.218955] UDF-fs: Scanning with blocksize 2048 failed [ 2567.245941] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2567.266097] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2567.318355] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2567.330737] UDF-fs: Scanning with blocksize 4096 failed 08:37:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xf0], [], [], [], []]}, 0x585) [ 2567.397964] UDF-fs: Scanning with blocksize 512 failed [ 2567.400241] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:37:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x8cffffff, 0x0) 08:37:42 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9d00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2567.400772] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:42 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f0000000080)=0x81) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/dev/nXllb0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2567.400784] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2567.400792] UDF-fs: Scanning with blocksize 1024 failed [ 2567.408794] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2567.409375] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2567.409388] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2567.409395] UDF-fs: Scanning with blocksize 2048 failed 08:37:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xa0118000, 0x0) 08:37:42 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9d01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2567.412558] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2567.415359] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:37:42 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_getparam(r1, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000040)={'gre0\x00', {0x2, 0x4e1f, @multicast2}}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000200)=0x9) r3 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/validatetrans\x00', 0x1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f0000000240)=0x1000402, 0xfffffffffffffe18) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2567.415372] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2567.415380] UDF-fs: Scanning with blocksize 4096 failed [ 2567.415389] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:37:43 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]]}, 0x120) 08:37:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xc0ed0000, 0x0) 08:37:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2568.610806] nbd_handle_cmd: 50 callbacks suppressed [ 2568.610821] block nbd0: Attempted send on invalid socket [ 2568.610837] print_req_error: 50 callbacks suppressed [ 2568.610846] print_req_error: I/O error, dev nbd0, sector 64 [ 2568.612634] block nbd0: Attempted send on invalid socket [ 2568.612652] print_req_error: I/O error, dev nbd0, sector 256 [ 2568.613012] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2568.613276] block nbd0: Attempted send on invalid socket [ 2568.613290] print_req_error: I/O error, dev nbd0, sector 512 [ 2568.613368] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2568.613380] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2568.613388] UDF-fs: Scanning with blocksize 512 failed [ 2568.613849] block nbd0: Attempted send on invalid socket [ 2568.613863] print_req_error: I/O error, dev nbd0, sector 64 [ 2568.614066] block nbd0: Attempted send on invalid socket [ 2568.614080] print_req_error: I/O error, dev nbd0, sector 512 [ 2568.614119] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2568.614277] block nbd0: Attempted send on invalid socket [ 2568.614291] print_req_error: I/O error, dev nbd0, sector 1024 [ 2568.614671] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2568.614683] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2568.614692] UDF-fs: Scanning with blocksize 1024 failed [ 2568.615013] block nbd0: Attempted send on invalid socket [ 2568.615028] print_req_error: I/O error, dev nbd0, sector 64 [ 2568.616316] block nbd0: Attempted send on invalid socket [ 2568.616332] print_req_error: I/O error, dev nbd0, sector 1024 [ 2568.619251] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2568.619416] block nbd0: Attempted send on invalid socket [ 2568.619431] print_req_error: I/O error, dev nbd0, sector 2048 [ 2568.619485] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2568.619497] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2568.619503] UDF-fs: Scanning with blocksize 2048 failed [ 2568.619815] block nbd0: Attempted send on invalid socket [ 2568.619831] print_req_error: I/O error, dev nbd0, sector 64 [ 2568.620068] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2568.620231] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2568.620241] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:37:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x180], [], [], [], []]}, 0x585) 08:37:44 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9e00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xf5ffffff, 0x0) 08:37:44 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@privport='privport'}], [{@smackfsdef={'smackfsdef', 0x3d, 'wlan0eth0mime_type\xa1bdevvboxnet1wlan1!'}}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2568.620248] UDF-fs: Scanning with blocksize 4096 failed [ 2568.620258] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:37:44 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]]}, 0x120) [ 2569.599000] 9pnet: p9_fd_create_unix (14441): problem connecting socket: ./file0: -111 08:37:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xf6ffffff, 0x0) [ 2569.658662] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2569.688892] UDF-fs: Scanning with blocksize 512 failed 08:37:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:44 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9e01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2569.689498] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2569.689508] UDF-fs: Scanning with blocksize 1024 failed [ 2569.697905] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2569.697922] UDF-fs: Scanning with blocksize 2048 failed 08:37:44 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xc000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2569.708870] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2569.708881] UDF-fs: Scanning with blocksize 4096 failed 08:37:44 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]]}, 0x120) 08:37:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfbffffff, 0x0) [ 2570.000704] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2570.000717] UDF-fs: Scanning with blocksize 512 failed [ 2570.001085] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2570.001094] UDF-fs: Scanning with blocksize 1024 failed [ 2570.001324] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2570.001332] UDF-fs: Scanning with blocksize 2048 failed [ 2570.002972] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2570.002982] UDF-fs: Scanning with blocksize 4096 failed 08:37:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x700], [], [], [], []]}, 0x585) 08:37:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:45 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9f00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:45 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fchmodat(r1, &(0x7f00000001c0)='./file0\x00', 0x6) r2 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180), 0x10) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000001440)) r3 = dup(r0) socketpair(0xc, 0x80000, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) r5 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000001400)=0xb0000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xfffffffffffffeb3) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@dev, 0x0, r8}) sendmsg$can_bcm(r4, &(0x7f00000013c0)={&(0x7f00000012c0)={0x1d, r8}, 0x10, &(0x7f0000001380)={&(0x7f0000001300)={0x0, 0x481, 0x7, {0x77359400}, {0x77359400}, {0x0, 0x1, 0x1}, 0x1, @canfd={{0x0, 0x1, 0x1, 0x1}, 0x27, 0x3, 0x0, 0x0, "28a0e18c0df23163c4fdf4d54a04c8b392959a3007ce64a7c77143fef6f06a8b1d731a5f43282afc6392a754a56ee5506aa8667fee031af9ae8555e313d1a0d3"}}, 0x80}, 0x1, 0x0, 0x0, 0x8040088}, 0x80c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) r11 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000001480)=r7, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet6_buf(r10, 0x29, 0x2d, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=0x1000) openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r12 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r12, 0x541c, &(0x7f0000000040)) r13 = fcntl$dupfd(r12, 0x406, r10) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r13, 0xc0406618, &(0x7f00000014c0)={{0x0, 0x0, @reserved="0c3997ff022a662b88a0b2b3f9e5d2449c3ad280abce4980a64c3ca33355582c"}}) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='hpfs\x00', 0x0, 0x0) 08:37:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfeff0000, 0x0) 08:37:45 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]]}, 0x120) 08:37:45 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]]}, 0x120) 08:37:45 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0x9f01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xff0f0000, 0x0) 08:37:45 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap$usbfs(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x100010, r2, 0x7fff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:45 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]]}, 0x120) 08:37:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x900], [], [], [], []]}, 0x585) 08:37:45 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa000000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2571.177213] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2571.223756] UDF-fs: Scanning with blocksize 512 failed 08:37:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2571.254140] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:46 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a]]}, 0x120) [ 2571.297127] UDF-fs: Scanning with blocksize 1024 failed 08:37:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffff0000, 0x0) 08:37:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa001000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:46 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000040)) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="f8278000d7a4f2feb3f7ebba7aa596db2569eebd9474800e06ca0283e6832f057fcd08084ce62eae2a5a450a8b6afc8200af70b1ed2f42661ee1b5356d16d913ed017e4c5501c171f9a7a4ef087f77989e2a6657f0c634b52397c555ae117a73c492a6cc0cf2cccc2ee78a0a410009649acf79b543dc3e584376815ac8ba4facdc1e345a56f298e2e759dbc55593faf075de262488009370d482591e714da947459d4c6a2d7f2c035ed266a4cb00fa4e27fbf36dd36f2b828dfae9bdf64f2fb1519ca498c6aab7e6a146428d7592ca52c42a38498b6cc5c04ab97eff11412b09ad8a06ff09d8ad4d311019ee1698042584", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESHEX], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYPTR, @ANYBLOB="e25d2149e4a00fd0cdd0c44e48f13fd52cbc0762e7030c0d5d6845cb3b637c1d2719d0b6fd42398efe1cde0093b5a61813e2d0f34ad2a19596836c078fa8ba28ad85bb88c968c717e5c9dec37b325c1e02f2988ba010000de453f95c7c74e7250433ab9232596fa4e2f4d91a4c8296c168a52de78486efdbdc4083a9a20afa7b6e4992af62d095287244b030da811292372d45ce0b225b28fc6b69f69ba546f5c77a0d35a17e531c6235255fa98a744a52db9bd4", @ANYRES16=r0], @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESHEX=r0], @ANYRESDEC=0x0, @ANYRES32=r0, @ANYRES32=0x0, @ANYRESHEX, @ANYRES64=r0], @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRESHEX], @ANYRESOCT=r3, @ANYRESHEX=r4, @ANYRESDEC=0x0, @ANYRES16=r0, @ANYRES64=r5], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cifs\x00', 0x0, 0x0) 08:37:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2571.352181] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffff1f00, 0x0) [ 2571.352192] UDF-fs: Scanning with blocksize 2048 failed [ 2571.352647] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa100000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2571.352656] UDF-fs: Scanning with blocksize 4096 failed 08:37:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:46 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) 08:37:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xa00], [], [], [], []]}, 0x585) 08:37:46 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b]]}, 0x120) 08:37:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa101000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfffff000, 0x0) [ 2572.243602] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2572.300322] UDF-fs: Scanning with blocksize 512 failed 08:37:47 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e]]}, 0x120) [ 2572.366611] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa200000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:47 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) statx(r3, &(0x7f0000000100)='./file0\x00', 0x6000, 0xd4f20fe8202d7c15, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x6, &(0x7f0000002500)=[{&(0x7f0000000240)="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", 0x1000, 0x9}, {&(0x7f0000001240)="00f5dcce735dc58f079fb2d257ff67a727962bd8c46cf59a50fc7384d841314917df04b58c074655f603748d8271166497440386a0efa9e97f2652c809b10d7f187f2634d9e1f2d3d515fa0ae8cf834e8511badb17db7c2158ed", 0x5a, 0x6}, {&(0x7f00000012c0)="39112c84dcad28042f311a428c627a6ea4d78c5b565f7ea9d221308184c858be4a8344d16e35bbe73050a824c7c9f3f5c942d51fe70633d5e17ba62cce27ab960dcb42ef0f3c1e12342432344c36fe49bb9a439d9dd1c2287af5c4445a2d0d2c3daac40f03dfa1fb0c6a5b9e668844ec5ed445a85086bf52a6d92ab4c10c9aea88bce4a19da0c013976b4e418fdba8f3d8ba", 0x92}, {&(0x7f0000001380)="b853dab980fda9b51731c1baef73c401c3e5e21607ffff570d4332bd655304a8ee1229424d9ee49328ad8fdb487a355a039678df5e67f10d31d632ec39b6ae8dfc05b7d3ead6e7205493ac66dc39cc21e6e11040d5241b4899752cec20f8040e651cb9a3db33e74336ee9bd68b4f046939be94b56bd605e2394e5c5c786013f0cabd907ccc2511400d8df1d4e01838de3314a9ab875e2787346a8cd443749c0ccc57f1695cdca0d953d1e327f270fff91ef7f54897684481e9851fc68d2dfc20829bb9021674a06bce7047e26616247f14fcb79ea3e42e08eab087d19e45dceae61aa250494461ac5b3ddb3c739588fe4a5184d40c", 0xf5, 0xb83}, {&(0x7f0000001480)="2e54202f8920cb4658dfebb38a2fbc0ec877b381bf56b10ded7a11e6a738f5e67604352ef76d915a00b7329160d5809eadff46a468c7aa0f548871005fedb00b1d08c5c6b433a86d2c1ff10f7cb827623ad9006fd971a5df4e9976e5308fae611da792858d9ad519f7170dd3f27b2898b7e0bd1c214a02ca131cfa5a9070db4c77ed1200c5fe82b60998c556a3b16f64877e4d2fa7e1646a15c7ad7c9bbe603f8aa73cc5b62b9fde4dbc0d4b7ea818899617b52775b7e1ed5ab46aac5f494a5ea96f2ff3827129a155ad6e61cdef915c2d3bc4271b7c851878f729c7a7600fe945b095807ff6612eb14cbb1ebc8c85762d920ae16c443f0ea4817a24e270497703a5761fab7fa20724ebc98c6d14fd616461896d65886986e09b7c88844d5736048cbc0eaecc83eeb8b18a14c549340250d2a39bb73c59f02f465f821820282677d7b408b103b133cc38290fa11f0048766c4a54a15c2680282908e8d341341d1a8eb4b9f0d71b5bf77f5a30d5a353b025028aa98c8c9a2d273a49ca384580d187c90aff69bf2f96f2c0abd6a30ba536500e66f15e2df090e8e0cab1905a60fc608d3620197ec984bea8731358d58a81266bb77c9bdb46e777c3e9f96c76ad27efb3d15802a89f242448504038af4db4986703e55f58760cdaa40acad92d038227ebcc41f4418ec62505e9fea8c098ee1c59594107de1de9621bd89061312992428484743e48e418617565a217536f4295fa9bbfb614c423f1aa0b901a9b101ee3001a8b84da29d45551e25fef9b71d74b00435ab193fa8bd968395bb20b261ee86a74f3e5fc9d064b6c229cf5ada82770c95b8914aa5c5b0e486920f9ce5f2f9d979bd3746da27e5f14dd92179050fd94cd107310a1e508d508660268cb89cab45a3181161de79be559cba9a0b8e42dd0cd6e73c714ce831e63c10ac35416c33e15d41a24069b1cb0d9ef476ab8bc9bd661fd0f92bf5e171d348ea4a20736a829b9f1441771f43dff8596db75940e6407acd0f2a30472b2411fa2e0b113fcc4a2aa67c9e4e20f7fa4a0fbad7c49928a01751a732258aba38dd28184bc08ff2395581f106ca7bc6ba5706756387abbc0a9f8abf92c1f363fcdcc21c5eb62b219b2c5ee1d30dfb61ad15f0cd87fabf83e59a728360809f2a1cc7e188abfff84b787e181c35112c2acd79487f5e8388153b0f34ce138240a4188c691040d3e24abcde7e80708b7b28147d8d5d734f72fc4902605015cdef4831adc9c61df6ec6558950dbbf4093909dba5f1c2c4c9ccdda9c58f6e8bd700e16e145dce3cac9df5c0485d51f7779489abc4872622ac49c8d2f886a76774a87c346b8c1c3889fd5d6298b1bede7ad1a559777656448f6b75baab3637dd1b19e1c78484fce21f665952d12ac3ab1d39b6573ecf646ec564a4cd2089bc6f6d472f7606f518c07dc45f318379633f1ebdc694b01e6da59478a268e4dd4baebb38f342e8f6ad3cde5a1aa747b50ada1cb445b871e0d597439164a80b6aa4d76a6eb91bfdb2ae606822e202925e91c7796d017a6b57cc14a58eda010e02289a16ffc24c8af24e92612cac4d735688a291d3d6cb7ed68a8587d81baa668a69f1bcddaa32c5268ef73451612c5abb289db86b249d4fd3b8cfd50451256cdab8d523b1e6906f3bbcf3772bab645114cdbe45a77598303e1d29172f14f255f0ee9cad4d456e326686c3189f33a24cb5cdfe41ac9e7d8234ad953d99c69a439ff2b8fccb6f05dfd7acd2fd2c06cb6db347a9bb94c837543f2f086052336639b85744e8057b9c834f6b99a021a8862a723c0cc92f122d14fb6bc44c3781c55154728f35003fa9edaa589e28fefb3e07f91ec2be0f08eb9c46ae068dc4aa957446ef4b2147d857a2afebe6d71fdb8f4e87f8e3086269031ba88a72f980d2f9544990c7423395dea283a39c94a7b82f930f18f305edaa29530065d63e1d274bc832e94aa605c0b39d8b2540a0a96337f9586d77ed2e7ac03382ae89b6b8370baede1ba93ce277fc8ec87fb8b8107ccf3d790fc9f14e8f6fd8de9a407b8c66ba991f28400ef9cff1f1408ef11b61ebe370d6617a17c551b2eb9fe9d64604e84602acdb9bdd89de3c375852a471a2e25ba80f83fbe1f6a70507a2ac66afcac5dc4acc4f1eaa9d02ec85227bcb9656128bb38bbfced971b14013b97217e37904a11cc1e9a0a545637db93133f5b1a9aa1a770032fd60da59b72033eed7f99eb9a6643fd639dcafc69d609938bd6cd7277bb047f1fc84d79f0727070eb15b7bed0c090ae7663a37e86ff83479083748b26672b788bf8518c855fd103938054700acfceebdd43bf9209310003d343058c46ef0d31d05fefbbe4294632278d205416ea2ae2fd7d6a63a6872d1e306bca8cad96a409595063e6ce3545add154782218ad1661326b9c39b0a5227610b6d27c9ea0111c1ca23e5c53ed88bc616c9270c427deac82e47c1f826d97a971e27a73132f12b3a83f702271e0ff01827b8d2d84f3650d4b7bdd8871640c49613825b2f16e1088a84c62035332aa24b92eaab58687ca2285d1c1edfe3a6aa8c8ab7271b5156eab02b5d43b2e5a266c6719f7843fdba69b92fc8cfe0398ecd16dbf4006a1759bbd991dea4e72acc9f91a90fa04d5134178cda020074225692a0bed2f402078e3507b0854c54fd6b63f8c54fb91e03cae546bdbfb4c2b5f055ae5237007518a61ba17be344e4bce9be06caf8daee48b5d01e3e4dd75360e2804a0998bd849ff69b81383a4fa956110d44dc979fa21f12fb07e7c8ac1d0f76f7e771bd0fb1c499fa69190463ecfe0ac80daf289463821cfa5c77cfe4a952ca0ddc76b02c6ef59aeb52b55cb2823ba987f44dd66eb2e0011cd467667efea5e68fa8d048359215c8362ad6063d386fe4db0501aff915c8360958998e96123683a99356f4d69ed94eee1c30226dd1bb839070c29f9f6d2dfe32868db52b8fea3df50b481471d3ebfd4e65ab266fc4e7dc3b23c6a6c9dcb4e398ca843ed1817c4d485b380f222bf0ecf3e6565bb34087dbc8aa9437e7a52ed967e5bcf5e8ba1e3e9f69aa6ee9d38513fdd2a798097be2f9ef3d97f0f0a6d9488c557e2ba9d24556127b73921056ae80a7dca315ecde8a77f131a58575c99daade01cb6012bfa18a8a058c2559f614d6abba8d0090f20a1fa02ffcb8cdacbea347cea51224f6fcfe480c4df7ecf3645529f05b738e273dc5fc76be7c019b01a3cab3295b872af50d9c8ea0f691481d20a6a1eaa5c3524300c394e05279b0737bdb6ce49991479a9755d6622969d326ea07d37c7f43c4fab259b06c8df1190cb4071c53f22a94bb361aaea879c0d25e5928b67d8fec399fea462cb41afcb10a4cd1f61373ad7605ac624eb621d5d0bdcd6e2d90a46414ac1e98db45e3578aa8931540f2752b96f722585351bb43390c19999332f0a8de6c750500f912a2d78deedd2d9b6778430ab010cb31985b180085221e242302d4aee4f7bb7b23df718ac60d81dea38a0f351d28b014a9978d47d2a29e8707c5101b15734f4545335db10a1d596a41d356f25fcdf266fd3dd652ca44c3a1e9f6e1d0bb05030518e635b94473684e22c6ff19ce1ff61f7c00a181ad2502ed7904ed3bf25279164098a06b18389e7a86b2d2d93ae83551f0143e5a6de4f46148869f5252a4f4fef69cfbf011467fa36128a69ef89ec07098fcf6b3e806cc691684563e332a5875172ca0e37b2d902cec8e92201f831674f9bd02894067a80c50ac1d6ae0b173eeaf37ae16c71607ac26c69a9855b1ffc01c8230d996bf45636046e72a87a32ae2f11871373e9027586e80930c61704d257af69ed4dc5478440b3c601f35e3e771fb750ffba95fa64cf5a47f21e7302fcaad4fd05e7ebc63dd81e411eafdc7bce80c4eb666bfb86f847fc1d34eba7f2dbe3f18c871beecb4e173cdc640d19d65e35794172edf2fc2ef5bbc4c37f32678a5257f94b66121268e2b0151771b0fb58b85359e4c6faef0630028b667c5f7ee9e7036bd8706c2c5af0b88ccf2796ae4fe1facc2d1923c8a06964f838daa5ee2fcebf9f1511a0191e32198666c9b7f4d4c72240e9a8eab3027f0317963cac1db4f065f39d18a1d0845f04ec192e3b47378eeba207e54ad4c41ada846b4b0b7239d58825e881e9a9286fffbb15ce2162e7dc1359ee4d0b303478df4f21d35264b94a3c376ca6ff50da744a8108d529e3458122bf0dba6d277fbe181421c7174aa0957dc32cd69c6f05ab10a509dbac276131227f87363cfbed90928db44434119683b354adff052fb603d5e2e4853bb78406116a6b74edc881c59b6c87661accf0e4e6f94ac40fd43e5e2305b212fbea19c84970a6ac3f30fca182a366e9fcb145f13128d70eefe35f8281033cbeb154d23d1cdf7b794502d1772527b2cc07bc1d23bf5ff9d2655ee640d78203e82bd640be321b345d4825fc4ba20a2248c818ec94d23b5abcf8188a92cdd7d7bc633e81be7b6ba520a28979ef8d3180c8b2906639d1d049e63491e94c83cfa9959b5b62a3a44727fce8e4df3afa69aa9ebb296b77ac7f986ebad1c29cbd43325478d9b52c154a6e1e7f011fa35d6c8200079032e1514b531435edec8a80eec22cde5535930f5e2f9e3617317114ba2b65faa92929553018f22b9332f1fe04362f76e241a80ac7c896017bb69e0d05a9fc890e0e336ffeb830bc7108358b9c5fe5a491eba734e6b3e0bf74a499a615242615f794eec64f5891737c081be3a1534264cb310add9794d394e82b5ba0b6efe4b18d38c4caa4fa6945941a0d538a35cba265f29664314decce9454a2059b013550b62897b77d81466fb107ad60b97cd24321d13feeb60255abff498d1e3454373a4d25852953dc114dfc7a317c5d59167602726006ffea6daed5fa4d45bcaa4f84ca2a2143ba59c8160716f8c0603262938ff18db796278222bc51c6b45480df712dca1b20b26310ef0361238f769abd483e1e1d8459309ee8fa07c60eeb3ace9e182bbdb9f8df19485e87312c29894dc8e2863c83437d2423600c11411fd88893302d7de0776dc7e7dcef001f15dad2dfcf8f31f27cb925573c302149ac64762f4526686a61bc504fc41fb53fb0f0d04e7729b76d4d85948c600c9ba997e58854fb4ee55f8a9799024bec003e843b2a9c3593492f3518e831c759b579daf04f979249d890aef65cc00df377a8b8adfd1f6a7e71075d2ac0766c528a51c7a2788489120268c5c5f2390b82cb915af3058b0d8b4265a4cd22131e739f592e2960d3932531c000d250cb9516d2cf48a4d525c4885c3d7717a2ed1353b903e2a8fb7a7f24c3c91252209bad4e1f9e8b10e41df3ec4586c5d3069a68f3ef550f3f4d4dae78f0edcd3f652fd1478b96b881d52900bccf04e0f4c8fd2798819ad7c84476335932bb1bb238f5e5fdca5574735062495d42c84e96edc9067f4c6da116e26212b0e17c4690ee1344c6b10f0bd942cc64d935c79a00f3688135346f6a16ea7a77a07ee7863fb128be520ba0dfc75c6b95a458ac27219814b8e9fa06e881c539aa690248e866d5593afce552d8c095e183397ebe448eb5d164a6998cccdec3f4b45844c05fef9d3d7f87352ba50a0744b693f09afc985ada64672282803fa492c3d255e65f0e12b62e2bc72a8ef9cbc5c52a89630deca0e41f371c6dd17ef58b4d5c40dabebe8753f4c0b37280b5ec1c4bbf1379cb67fe1fe43a6d53f2c24a314379159963d6200214996f4cae26b54fc00f7ef0d73aee3b2a1f8c47400705a05422ff8a5ea9", 0x1000, 0x800}, {&(0x7f0000002480)="d467c110c8e39dd4f447abb11ed553e57e2d647df52b5f85f12b2a0fc3085f5e218130343aade479e81b0bd59c4ad9785bf722922da7b34851efb2625ef8b7decd00b424c165aa631134d0932b78685a8d981384d01aee087503b908", 0x5c, 0x7fffffff}], 0x13028, &(0x7f00000026c0)={[{@show_sys_files_yes='show_sys_files=yes'}, {@errors_recover='errors=recover'}], [{@fsmagic={'fsmagic', 0x3d, 0x2196}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@dont_measure='dont_measure'}, {@subj_user={'subj_user'}}, {@fowner_gt={'fowner>', r4}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_user={'obj_user', 0x3d, '$wlan1-^!selfG&]eth0md5sum^*'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}]}) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000ef62403077f15cf3950b2afaa6a13281dd2118ca00bc9681be5f06ef81c7ba12674604c892dcb81eefa8672dbc7f3610fe9d8b2293556c0000060728ecd61574247d72118e699164c3f97aa19e731ab9a2e65b188ee7d205927e3b83"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfffffe00, 0x0) 08:37:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2572.415444] UDF-fs: Scanning with blocksize 1024 failed [ 2572.420094] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa201000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2572.420105] UDF-fs: Scanning with blocksize 2048 failed [ 2572.427384] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2572.427395] UDF-fs: Scanning with blocksize 4096 failed 08:37:47 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='llb0\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) set_robust_list(&(0x7f00000001c0)={0x0, 0x6, &(0x7f0000000100)={&(0x7f0000000080)}}, 0x18) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff}, 0x80000) dup(r2) 08:37:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffffff7f, 0x0) 08:37:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xc00], [], [], [], []]}, 0x585) 08:37:47 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b]]}, 0x120) 08:37:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:48 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa300000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffffff8c, 0x0) 08:37:48 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]]}, 0x120) 08:37:48 executing program 1: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) readahead(r2, 0x4, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="106465762f6e5d6c6c623000c8835577bb3dcb19ebc5b913d368f2fdd9dd0b5839b71b08666c2a8164241962dfb4e0117a1ae93cc580e06578170db6"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$CAN_RAW_LOOPBACK(r4, 0x65, 0x3, &(0x7f00000000c0)=0x1, 0x4) 08:37:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfffffff5, 0x0) 08:37:48 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa301000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:48 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) munlockall() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0x10) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) dup(r0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$l2tp6(0xa, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@dev, 0x0, r8}) sendmsg$nl_route_sched(r4, &(0x7f0000000900)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000008c0)={&(0x7f00000003c0)=@newtclass={0x4e0, 0x28, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0x1, 0xd}, {0xffff, 0xfff3}, {0x9, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0xe1, 0x5}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x408, 0x2, [@TCA_CBQ_RTAB={0x404, 0x6, [0x8001, 0x40, 0x8, 0x10000, 0xf28e, 0x8, 0x2, 0xd0, 0x3f, 0x1000, 0xfffffff5, 0xbb, 0xfffffffb, 0x8001, 0x1, 0x0, 0x4, 0x3f, 0x10000, 0x8811, 0x8, 0x6, 0x1, 0x7fff, 0x20, 0x1000, 0x6e, 0x6, 0x8, 0x7, 0x8, 0x101, 0x6, 0xfff, 0x80000001, 0xa8a, 0x3, 0x6, 0x0, 0x800, 0x7, 0x3f, 0x7ff, 0x7, 0x3, 0x1, 0x4, 0x40, 0xffffffff, 0x4, 0x5, 0x3, 0x400, 0x2, 0x4, 0x9, 0x1, 0x400, 0x6, 0x10000, 0x7, 0x80000001, 0x24e9, 0x3b80, 0x83a, 0x3, 0x5, 0x0, 0x2, 0xfdf, 0x20, 0x57f4, 0x1f, 0x0, 0x30b0, 0xb4a, 0x1000, 0x5, 0x4, 0x3f, 0x2, 0x401, 0xd3d0, 0xc2, 0x6b0, 0x9, 0x7, 0x6, 0x5, 0x2bad0000, 0x570, 0x8, 0x1f, 0xd07, 0x6, 0x1, 0x3, 0x7e, 0x6, 0x7, 0x8001, 0x5, 0x0, 0x6, 0x7, 0x283e, 0x20f3, 0x1000, 0x8393, 0x3, 0xfffffffa, 0x80, 0x9, 0x80e7, 0x6, 0x3ff, 0x0, 0x4, 0xf2, 0x36, 0x0, 0x3, 0x8, 0xbd, 0x7, 0x5, 0x2, 0x9, 0x8, 0x8, 0x5, 0x6, 0x3b6d, 0x7, 0x7, 0x4, 0x4, 0x5, 0x2, 0x3, 0xffff, 0x7ff, 0x200, 0x1, 0xe5, 0x7fff, 0x3ff, 0x3, 0xa7, 0x80, 0x8, 0x3ff, 0x9, 0x2, 0xffffffff, 0xfffffffa, 0x3, 0xe7d, 0x100, 0x6, 0x7fffffff, 0x2, 0x10001, 0x6, 0x80000000, 0xd419480a, 0xffff2a7e, 0x5, 0x2c, 0x3ff, 0x0, 0x2, 0x0, 0x3f, 0x7, 0x6, 0x4, 0x40, 0x0, 0x2, 0x677, 0x3, 0x2, 0x59c, 0x8, 0x2, 0xfb39, 0x7, 0x8, 0x1a73, 0x81, 0x7f, 0x1000000, 0x30, 0x9, 0x46, 0x0, 0x1, 0x642, 0x6, 0x7, 0x4, 0x6, 0x8000, 0x6, 0x0, 0x8, 0x10001, 0x0, 0x2, 0x2, 0xfffffffa, 0x1, 0xc15, 0x4, 0x9c, 0x0, 0x20, 0x401, 0x8000, 0xffffffff, 0x10001, 0x3, 0x7fffffff, 0x3, 0x1, 0x9, 0x0, 0x5116, 0xd1, 0x2, 0x9, 0x3, 0x5, 0x7, 0x1, 0x800, 0x3dea, 0x42, 0x8, 0x3ff, 0x2c1, 0x8, 0x3, 0x6b107473, 0x8, 0xf51, 0x7f, 0xda68, 0x3, 0xd0a, 0x83c4, 0x5, 0x75b55f93, 0x8812, 0x5]}]}}, @tclass_kind_options=@c_red={0x8, 0x1, 'red\x00'}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x68, 0x2, [@TCA_ATM_HDR={0x4}, @TCA_ATM_HDR={0x23, 0x3, "8f3807f10537490937d709fdd3300d8ce0e13485a7a2a5e245752c511f0306"}, @TCA_ATM_HDR={0x3c, 0x3, "294d90371231f4f144b75d3c1d4a2b327eca9d0f6a0ad5683b4121a8b06f177e8dbca984d141fe1f7c43647046e3df6ca25e5ebd26ce3e07"}]}}, @tclass_kind_options=@c_netem={0xa, 0x1, 'netem\x00'}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x3}}}, @tclass_kind_options=@c_multiq={0xb, 0x1, 'multiq\x00'}]}, 0x4e0}, 0x1, 0x0, 0x0, 0x4044000}, 0x40001) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) quotactl(0xc4f, &(0x7f00000000c0)='./file0\x00', r9, &(0x7f0000000240)="74934f10026219822fc02e1597f6e17fea9e7b7fe3b257ad9f3e62c9260d21f469d41597119a11247a33e1229e47cf816a83ccbc0182c34f53ae51ce4c348f12dcdc9762d0ee0e341961f92c84b7d893255c9968a82e22bb748a0a0cbd974a44bbaafb8d296d9e7094310471da46909bbfb9f098c1bbac19765139feab9dee") syz_open_dev$binderN(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6480762f72756c6c0230008b6bdb813791d7040ffea43a2e3b2f298f55d2731b51ffff19ee3418043a8799a67c4d47237847918d55be535340ec1a00fd4f5c76a8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:48 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180]]}, 0x120) 08:37:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xd00], [], [], [], []]}, 0x585) 08:37:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfffffff6, 0x0) 08:37:48 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]]}, 0x120) 08:37:48 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa400000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:48 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f64652cdc9713917ddb6900000000ce49642f6e756c6c623000c587d4dab93b0fed28774e74986ab123abc5aa9a3cd474f198914785903884d7fa2640ce0f80aefd4ee034debd2d03b5018a0787b1ccd0ff44e9fa6f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:49 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa401000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfffffffb, 0x0) 08:37:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="de645f3cb3e801ffffff3000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:49 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]]}, 0x120) 08:37:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xe00], [], [], [], []]}, 0x585) 08:37:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xedc000000000, 0x0) 08:37:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:49 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa500000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:49 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]]}, 0x120) 08:37:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="050000000000000000000000016f4e6ef537319814cbfa2efc6e8755ff98e9a776a3e7efbc4e7c60a263854c28a0bb54254caed62c516c3759607c3186d565d053d1dfefb92fc84c5b91721721ecc2f232161670016a0cd2eba608fb9f09fbcd5cd1977b98534e04cb6eaa1330e29ff558343cd6f9b38fe5da836e4d56c3a15471dd8f9ddd"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x840010, 0x0) 08:37:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x1000000000000, 0x0) 08:37:49 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa501000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f646576d500000000000000", @ANYRES64=r2, @ANYRES16, @ANYRES16], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/65, 0x342}, {&(0x7f0000000400)=""/28, 0x1c}, {&(0x7f0000000440)=""/115, 0x73}], 0x3, &(0x7f0000000500)=""/129, 0xfffffffffffffe19}, 0x11e7c5a49ede2eef) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000640)={0x3, &(0x7f0000000600)=[{0xfb, 0x6, 0xff, 0x1c258462}, {0x40, 0x0, 0x20, 0x1}, {0x40, 0x20, 0x40, 0x2}]}, 0x10) 08:37:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x2000000000000, 0x0) 08:37:49 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa600000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000700)={@local, @initdev, 0x0}, &(0x7f0000000740)=0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r3], &(0x7f0000000000)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x20005}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3, 0x8}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) bind$pptp(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) 08:37:49 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]]}, 0x120) 08:37:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xf00], [], [], [], []]}, 0x585) 08:37:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4000000000000, 0x0) 08:37:50 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]]}, 0x120) [ 2575.254980] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2575.276917] UDF-fs: Scanning with blocksize 512 failed 08:37:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:50 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa601000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2575.320981] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2575.320991] UDF-fs: Scanning with blocksize 1024 failed [ 2575.321733] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:50 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2575.321741] UDF-fs: Scanning with blocksize 2048 failed [ 2575.327427] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6000000000000, 0x0) [ 2575.327437] UDF-fs: Scanning with blocksize 4096 failed [ 2575.603755] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2575.642822] UDF-fs: Scanning with blocksize 512 failed 08:37:50 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa700000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:50 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]]}, 0x120) [ 2575.661779] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2575.684850] UDF-fs: Scanning with blocksize 1024 failed 08:37:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2575.720802] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1800], [], [], [], []]}, 0x585) [ 2575.762258] UDF-fs: Scanning with blocksize 2048 failed [ 2575.779584] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7ffffffffffff, 0x0) [ 2575.817485] UDF-fs: Scanning with blocksize 4096 failed 08:37:50 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa701000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:50 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]]}, 0x120) 08:37:50 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x3000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x2000000000010d, 0xa, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) shutdown(r1, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='ceph\x00', 0x1, 0x0) 08:37:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x8000000000000, 0x0) 08:37:51 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa800000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000040)={0x40000012}) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6e756c6c623003c5461e00302f926152630000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1a00], [], [], [], []]}, 0x585) 08:37:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:51 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]]}, 0x120) 08:37:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xa000000000000, 0x0) 08:37:51 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa801000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:51 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4c, r4}) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:51 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]]}, 0x120) [ 2576.598993] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2576.599007] UDF-fs: Scanning with blocksize 512 failed 08:37:51 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000080)=0x4, &(0x7f0000000100)=0x4) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xc000000000000, 0x0) [ 2576.599878] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2576.599887] UDF-fs: Scanning with blocksize 1024 failed [ 2576.601005] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2576.601013] UDF-fs: Scanning with blocksize 2048 failed 08:37:51 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa900000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2576.602137] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2576.602146] UDF-fs: Scanning with blocksize 4096 failed [ 2576.862686] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2576.879378] UDF-fs: Scanning with blocksize 512 failed [ 2576.901886] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2576.938125] UDF-fs: Scanning with blocksize 1024 failed [ 2576.969031] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2576.983073] UDF-fs: Scanning with blocksize 2048 failed 08:37:51 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]]}, 0x120) 08:37:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xe000000000000, 0x0) 08:37:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1b00], [], [], [], []]}, 0x585) 08:37:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2577.004892] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2577.018653] UDF-fs: Scanning with blocksize 4096 failed 08:37:51 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xa901000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:51 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]]}, 0x120) 08:37:52 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000080), &(0x7f0000000100)=0x4) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x10000000000000, 0x0) 08:37:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:52 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xaa00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2577.328919] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2577.328931] UDF-fs: Scanning with blocksize 512 failed 08:37:52 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettaction={0x28, 0x30, 0x309, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}]}]}, 0x28}}, 0x0) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r6, 0x603, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2400}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x54, r6, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1f}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_OFFSET={0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2577.334944] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6b6b6b00000000, 0x0) [ 2577.334956] UDF-fs: Scanning with blocksize 1024 failed [ 2577.335357] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2577.335368] UDF-fs: Scanning with blocksize 2048 failed [ 2577.335611] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2577.335620] UDF-fs: Scanning with blocksize 4096 failed [ 2577.606296] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:52 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xaa01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2577.606307] UDF-fs: Scanning with blocksize 512 failed [ 2577.606682] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2577.606690] UDF-fs: Scanning with blocksize 1024 failed [ 2577.606920] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2577.606927] UDF-fs: Scanning with blocksize 2048 failed [ 2577.607151] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2577.607158] UDF-fs: Scanning with blocksize 4096 failed 08:37:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x2800], [], [], [], []]}, 0x585) 08:37:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x8011a0ffffffff, 0x0) 08:37:52 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x4) getpeername$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:52 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]]}, 0x120) 08:37:52 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xab00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2577.985245] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2578.024039] UDF-fs: Scanning with blocksize 512 failed 08:37:52 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00]]}, 0x120) 08:37:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2578.031234] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2578.059197] UDF-fs: Scanning with blocksize 1024 failed [ 2578.082387] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xf0ffffffffffff, 0x0) 08:37:52 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xab01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:53 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0xf}, 0x811e}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, @in6={0xa, 0x4e23, 0x8c, @mcast1}], 0x64) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2578.102421] UDF-fs: Scanning with blocksize 2048 failed [ 2578.102730] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2578.102740] UDF-fs: Scanning with blocksize 4096 failed [ 2578.377835] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2578.418234] UDF-fs: Scanning with blocksize 512 failed [ 2578.445639] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2578.459492] UDF-fs: Scanning with blocksize 1024 failed 08:37:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x3e00], [], [], [], []]}, 0x585) 08:37:53 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xac00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfeffff00000000, 0x0) 08:37:53 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00]]}, 0x120) 08:37:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2578.499649] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2578.518096] UDF-fs: Scanning with blocksize 2048 failed [ 2578.531284] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2578.559423] UDF-fs: Scanning with blocksize 4096 failed 08:37:53 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00]]}, 0x120) 08:37:53 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xac01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000001980)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001940)={&(0x7f0000001b40)={0x180, 0x2, 0x1, 0x504, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x9}, [@CTA_LABELS_MASK={0x8, 0x17, [0x800]}, @CTA_TIMEOUT={0x8, 0x7, 0x5}, @CTA_TUPLE_ORIG={0x44, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}]}, @CTA_ID={0x8, 0xc, 0x4}, @CTA_NAT_SRC={0x28, 0x6, [@CTA_NAT_V4_MINIP={0x8, 0x1, @remote}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_PROTO={0xc, 0x3, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}]}, @CTA_PROTOINFO={0x24, 0x4, @CTA_PROTOINFO_DCCP={0x20, 0x2, [@CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x7f}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x8}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x51}]}}, @CTA_NAT_SRC={0xb4, 0x6, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_PROTO={0xc, 0x3, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @broadcast}, @CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @empty}, @CTA_NAT_PROTO={0x1c, 0x3, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @remote}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @rand_addr="ead522766a93d35b38918053d94f8a1d"}]}, @CTA_ZONE={0x6, 0x12, 0x3}, @CTA_ID={0x8, 0xc, 0x1}]}, 0x180}}, 0x7afe8ae0d8e6576d) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4010000000, 0x8, &(0x7f0000001600)=[{&(0x7f00000001c0)="7d01734911b8f8a004b143f0cb235fabb75c3da686c3b408c5aff08272321a3c1772a030903b4d24fa0622aca3dc088564532987bf3c7f841485eeecfb03f022f4510258c30358e98218f1979b3cc575f433200802143c2d2f5174d14d808754dab4b87dc78c88582541bee8c965f2fb3c0581537aa6e01f30ad518c1588f783f0c0752fd9819ab27f08117c58a7c87e010bf1e9de3fb8266c11911f527f26993277055522f75f72602b4f8327ef40a7515e6c6a3663d74833461e42c313", 0xbe, 0x272}, {&(0x7f0000000280)="9cfaafc39dc84b94d7b0617ec70ff1b9436f1486a7a4c34e3741c5f0d362c7faec63b8d5cee9afcb94b2ca88d50e3646de9f7918236b3473177a572e85887f5be5b77bcbcdbf46fd6c777e61376df03091b78a9886a7faf7e86a4bd81155a4b06fad4ac1fe73d5203abe5257bb580bd1602445f60d38d8e5a3bff221ae3256f4ed0e2f15674100cb40264c9ba767862bfebde9768ae2b04736e7280553ec", 0x9e, 0x7ff}, {&(0x7f0000000340)="6806ab39d238166c4a3d6a7984b070ce47f2f4e1c7f83338d9fbe1b0c0cee4ccb77ef469", 0x24, 0x3f}, {&(0x7f0000000380)="325109ff509f88d39064e4d4f42a951db8a950af6ae17bd181430721a8d87db7abfe64ffdf4edc16f5dd24fa43635b9f56765371fe1c719caac06f5a9b8505b16d3a2b3d68603cd4876821ce159efef1c46e8c4a91c44f2773e02268", 0x5c, 0x8}, {&(0x7f0000000400)="e85434908b8b254cd04b36c9b6de6db9abdf200ab500474b4aa7efee0011e691d4e35f244cbdda7324df0445180e29b36e19ce8a539d8b917f64e74f4208451c11316e718631abcf472034bec489020735a711ef4b5f52db5dde0af02329c7007dcdb4705d549f078bdd42aeb59ae98e67a4748eafc807f5479db9a8f0b4b3ae3bdba6dcc90d863b66505f171c60b9f6339b1c7ca10377b74d5eeacdacc4bf07c109804c2c463506345f0cf22099f8c6fd3370a78ae7cc92132568fce29e40fe2a63225f435e0a9b2c6367c1471d9ef9a10561a156bcd6fd54a894ef70274df94332744c4a1e4572ef", 0xe9, 0x8}, {&(0x7f0000000500)="2d49594a1a13408f8ddfa6be5171eb07bfc29719711ed252829431fbe33ee5253a46c09ec6ef636e7f176a788cc975f29f1b7e1bb05dd6e5e84457b38cc85d7a688545deeb5cae94b693f48becbcd177ebb0debf5eb665857ee31dbd1e2cb811b0c3fbf6479567f2ade6994de22fbe761eaffe4074d4dfaec11559d5bde26fc56cf44c16a7cb45cf984367db345d94e177d1ef4da0046cb865f4e87ba6638ad3e8fa2dfd972219579b8a95562455399f99f28e3d2ad3596b", 0xb8, 0x5}, {&(0x7f00000005c0)="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", 0x1000, 0x7}, {&(0x7f00000015c0)="fce3fe17716cdaf5439a05c09c36f91b2b02c914a29130324954e13ff46cab16c3faed59d5", 0x25, 0x4}], 0x900000, 0x0) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x100000000000000, 0x0) 08:37:53 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]]}, 0x120) 08:37:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2578.931094] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2578.942414] UDF-fs: Scanning with blocksize 512 failed [ 2578.978843] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x7f00], [], [], [], []]}, 0x585) 08:37:53 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xad00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x200000000000000, 0x0) 08:37:53 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00]]}, 0x120) [ 2579.046948] UDF-fs: Scanning with blocksize 1024 failed [ 2579.069060] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2579.128585] UDF-fs: Scanning with blocksize 2048 failed [ 2579.168420] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 08:37:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2579.210239] UDF-fs: Scanning with blocksize 4096 failed 08:37:54 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xad01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x300000000000000, 0x0) 08:37:54 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00]]}, 0x120) 08:37:54 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f646576df08f228d618db18c1742f6e756c6c62300081e2b43556ea830d7b9e3c63b7ba14b985b88e37d8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:54 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xae00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x400000000000000, 0x0) 08:37:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x9b00], [], [], [], []]}, 0x585) 08:37:54 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]]}, 0x120) 08:37:54 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) munlockall() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0x10) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) dup(r0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$l2tp6(0xa, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@dev, 0x0, r8}) sendmsg$nl_route_sched(r4, &(0x7f0000000900)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000008c0)={&(0x7f00000003c0)=@newtclass={0x4e0, 0x28, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0x1, 0xd}, {0xffff, 0xfff3}, {0x9, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0xe1, 0x5}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x408, 0x2, [@TCA_CBQ_RTAB={0x404, 0x6, [0x8001, 0x40, 0x8, 0x10000, 0xf28e, 0x8, 0x2, 0xd0, 0x3f, 0x1000, 0xfffffff5, 0xbb, 0xfffffffb, 0x8001, 0x1, 0x0, 0x4, 0x3f, 0x10000, 0x8811, 0x8, 0x6, 0x1, 0x7fff, 0x20, 0x1000, 0x6e, 0x6, 0x8, 0x7, 0x8, 0x101, 0x6, 0xfff, 0x80000001, 0xa8a, 0x3, 0x6, 0x0, 0x800, 0x7, 0x3f, 0x7ff, 0x7, 0x3, 0x1, 0x4, 0x40, 0xffffffff, 0x4, 0x5, 0x3, 0x400, 0x2, 0x4, 0x9, 0x1, 0x400, 0x6, 0x10000, 0x7, 0x80000001, 0x24e9, 0x3b80, 0x83a, 0x3, 0x5, 0x0, 0x2, 0xfdf, 0x20, 0x57f4, 0x1f, 0x0, 0x30b0, 0xb4a, 0x1000, 0x5, 0x4, 0x3f, 0x2, 0x401, 0xd3d0, 0xc2, 0x6b0, 0x9, 0x7, 0x6, 0x5, 0x2bad0000, 0x570, 0x8, 0x1f, 0xd07, 0x6, 0x1, 0x3, 0x7e, 0x6, 0x7, 0x8001, 0x5, 0x0, 0x6, 0x7, 0x283e, 0x20f3, 0x1000, 0x8393, 0x3, 0xfffffffa, 0x80, 0x9, 0x80e7, 0x6, 0x3ff, 0x0, 0x4, 0xf2, 0x36, 0x0, 0x3, 0x8, 0xbd, 0x7, 0x5, 0x2, 0x9, 0x8, 0x8, 0x5, 0x6, 0x3b6d, 0x7, 0x7, 0x4, 0x4, 0x5, 0x2, 0x3, 0xffff, 0x7ff, 0x200, 0x1, 0xe5, 0x7fff, 0x3ff, 0x3, 0xa7, 0x80, 0x8, 0x3ff, 0x9, 0x2, 0xffffffff, 0xfffffffa, 0x3, 0xe7d, 0x100, 0x6, 0x7fffffff, 0x2, 0x10001, 0x6, 0x80000000, 0xd419480a, 0xffff2a7e, 0x5, 0x2c, 0x3ff, 0x0, 0x2, 0x0, 0x3f, 0x7, 0x6, 0x4, 0x40, 0x0, 0x2, 0x677, 0x3, 0x2, 0x59c, 0x8, 0x2, 0xfb39, 0x7, 0x8, 0x1a73, 0x81, 0x7f, 0x1000000, 0x30, 0x9, 0x46, 0x0, 0x1, 0x642, 0x6, 0x7, 0x4, 0x6, 0x8000, 0x6, 0x0, 0x8, 0x10001, 0x0, 0x2, 0x2, 0xfffffffa, 0x1, 0xc15, 0x4, 0x9c, 0x0, 0x20, 0x401, 0x8000, 0xffffffff, 0x10001, 0x3, 0x7fffffff, 0x3, 0x1, 0x9, 0x0, 0x5116, 0xd1, 0x2, 0x9, 0x3, 0x5, 0x7, 0x1, 0x800, 0x3dea, 0x42, 0x8, 0x3ff, 0x2c1, 0x8, 0x3, 0x6b107473, 0x8, 0xf51, 0x7f, 0xda68, 0x3, 0xd0a, 0x83c4, 0x5, 0x75b55f93, 0x8812, 0x5]}]}}, @tclass_kind_options=@c_red={0x8, 0x1, 'red\x00'}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x68, 0x2, [@TCA_ATM_HDR={0x4}, @TCA_ATM_HDR={0x23, 0x3, "8f3807f10537490937d709fdd3300d8ce0e13485a7a2a5e245752c511f0306"}, @TCA_ATM_HDR={0x3c, 0x3, "294d90371231f4f144b75d3c1d4a2b327eca9d0f6a0ad5683b4121a8b06f177e8dbca984d141fe1f7c43647046e3df6ca25e5ebd26ce3e07"}]}}, @tclass_kind_options=@c_netem={0xa, 0x1, 'netem\x00'}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x3}}}, @tclass_kind_options=@c_multiq={0xb, 0x1, 'multiq\x00'}]}, 0x4e0}, 0x1, 0x0, 0x0, 0x4044000}, 0x40001) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) quotactl(0xc4f, &(0x7f00000000c0)='./file0\x00', r9, &(0x7f0000000240)="74934f10026219822fc02e1597f6e17fea9e7b7fe3b257ad9f3e62c9260d21f469d41597119a11247a33e1229e47cf816a83ccbc0182c34f53ae51ce4c348f12dcdc9762d0ee0e341961f92c84b7d893255c9968a82e22bb748a0a0cbd974a44bbaafb8d296d9e7094310471da46909bbfb9f098c1bbac19765139feab9dee") syz_open_dev$binderN(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6480762f72756c6c0230008b6bdb813791d7040ffea43a2e3b2f298f55d2731b51ffff19ee3418043a8799a67c4d47237847918d55be535340ec1a00fd4f5c76a8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:54 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xae01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x500000000000000, 0x0) 08:37:54 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000]]}, 0x120) 08:37:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:54 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xaf00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x600000000000000, 0x0) 08:37:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:54 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) munlockall() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0x10) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) dup(r0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$l2tp6(0xa, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@dev, 0x0, r8}) sendmsg$nl_route_sched(r4, &(0x7f0000000900)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000008c0)={&(0x7f00000003c0)=@newtclass={0x4e0, 0x28, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0x1, 0xd}, {0xffff, 0xfff3}, {0x9, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0xe1, 0x5}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x408, 0x2, [@TCA_CBQ_RTAB={0x404, 0x6, [0x8001, 0x40, 0x8, 0x10000, 0xf28e, 0x8, 0x2, 0xd0, 0x3f, 0x1000, 0xfffffff5, 0xbb, 0xfffffffb, 0x8001, 0x1, 0x0, 0x4, 0x3f, 0x10000, 0x8811, 0x8, 0x6, 0x1, 0x7fff, 0x20, 0x1000, 0x6e, 0x6, 0x8, 0x7, 0x8, 0x101, 0x6, 0xfff, 0x80000001, 0xa8a, 0x3, 0x6, 0x0, 0x800, 0x7, 0x3f, 0x7ff, 0x7, 0x3, 0x1, 0x4, 0x40, 0xffffffff, 0x4, 0x5, 0x3, 0x400, 0x2, 0x4, 0x9, 0x1, 0x400, 0x6, 0x10000, 0x7, 0x80000001, 0x24e9, 0x3b80, 0x83a, 0x3, 0x5, 0x0, 0x2, 0xfdf, 0x20, 0x57f4, 0x1f, 0x0, 0x30b0, 0xb4a, 0x1000, 0x5, 0x4, 0x3f, 0x2, 0x401, 0xd3d0, 0xc2, 0x6b0, 0x9, 0x7, 0x6, 0x5, 0x2bad0000, 0x570, 0x8, 0x1f, 0xd07, 0x6, 0x1, 0x3, 0x7e, 0x6, 0x7, 0x8001, 0x5, 0x0, 0x6, 0x7, 0x283e, 0x20f3, 0x1000, 0x8393, 0x3, 0xfffffffa, 0x80, 0x9, 0x80e7, 0x6, 0x3ff, 0x0, 0x4, 0xf2, 0x36, 0x0, 0x3, 0x8, 0xbd, 0x7, 0x5, 0x2, 0x9, 0x8, 0x8, 0x5, 0x6, 0x3b6d, 0x7, 0x7, 0x4, 0x4, 0x5, 0x2, 0x3, 0xffff, 0x7ff, 0x200, 0x1, 0xe5, 0x7fff, 0x3ff, 0x3, 0xa7, 0x80, 0x8, 0x3ff, 0x9, 0x2, 0xffffffff, 0xfffffffa, 0x3, 0xe7d, 0x100, 0x6, 0x7fffffff, 0x2, 0x10001, 0x6, 0x80000000, 0xd419480a, 0xffff2a7e, 0x5, 0x2c, 0x3ff, 0x0, 0x2, 0x0, 0x3f, 0x7, 0x6, 0x4, 0x40, 0x0, 0x2, 0x677, 0x3, 0x2, 0x59c, 0x8, 0x2, 0xfb39, 0x7, 0x8, 0x1a73, 0x81, 0x7f, 0x1000000, 0x30, 0x9, 0x46, 0x0, 0x1, 0x642, 0x6, 0x7, 0x4, 0x6, 0x8000, 0x6, 0x0, 0x8, 0x10001, 0x0, 0x2, 0x2, 0xfffffffa, 0x1, 0xc15, 0x4, 0x9c, 0x0, 0x20, 0x401, 0x8000, 0xffffffff, 0x10001, 0x3, 0x7fffffff, 0x3, 0x1, 0x9, 0x0, 0x5116, 0xd1, 0x2, 0x9, 0x3, 0x5, 0x7, 0x1, 0x800, 0x3dea, 0x42, 0x8, 0x3ff, 0x2c1, 0x8, 0x3, 0x6b107473, 0x8, 0xf51, 0x7f, 0xda68, 0x3, 0xd0a, 0x83c4, 0x5, 0x75b55f93, 0x8812, 0x5]}]}}, @tclass_kind_options=@c_red={0x8, 0x1, 'red\x00'}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x68, 0x2, [@TCA_ATM_HDR={0x4}, @TCA_ATM_HDR={0x23, 0x3, "8f3807f10537490937d709fdd3300d8ce0e13485a7a2a5e245752c511f0306"}, @TCA_ATM_HDR={0x3c, 0x3, "294d90371231f4f144b75d3c1d4a2b327eca9d0f6a0ad5683b4121a8b06f177e8dbca984d141fe1f7c43647046e3df6ca25e5ebd26ce3e07"}]}}, @tclass_kind_options=@c_netem={0xa, 0x1, 'netem\x00'}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x3}}}, @tclass_kind_options=@c_multiq={0xb, 0x1, 'multiq\x00'}]}, 0x4e0}, 0x1, 0x0, 0x0, 0x4044000}, 0x40001) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) quotactl(0xc4f, &(0x7f00000000c0)='./file0\x00', r9, &(0x7f0000000240)="74934f10026219822fc02e1597f6e17fea9e7b7fe3b257ad9f3e62c9260d21f469d41597119a11247a33e1229e47cf816a83ccbc0182c34f53ae51ce4c348f12dcdc9762d0ee0e341961f92c84b7d893255c9968a82e22bb748a0a0cbd974a44bbaafb8d296d9e7094310471da46909bbfb9f098c1bbac19765139feab9dee") syz_open_dev$binderN(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6480762f72756c6c0230008b6bdb813791d7040ffea43a2e3b2f298f55d2731b51ffff19ee3418043a8799a67c4d47237847918d55be535340ec1a00fd4f5c76a8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:55 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]]}, 0x120) 08:37:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xf000], [], [], [], []]}, 0x585) 08:37:55 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xaf01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x700000000000000, 0x0) 08:37:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:55 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000]]}, 0x120) 08:37:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x800000000000000, 0x0) 08:37:55 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb000000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:55 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) munlockall() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0x10) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(0x0, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) dup(r0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$l2tp6(0xa, 0x2, 0x73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@dev, 0x0, r8}) sendmsg$nl_route_sched(r4, &(0x7f0000000900)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000008c0)={&(0x7f00000003c0)=@newtclass={0x4e0, 0x28, 0x1, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0x1, 0xd}, {0xffff, 0xfff3}, {0x9, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0xe1, 0x5}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x408, 0x2, [@TCA_CBQ_RTAB={0x404, 0x6, [0x8001, 0x40, 0x8, 0x10000, 0xf28e, 0x8, 0x2, 0xd0, 0x3f, 0x1000, 0xfffffff5, 0xbb, 0xfffffffb, 0x8001, 0x1, 0x0, 0x4, 0x3f, 0x10000, 0x8811, 0x8, 0x6, 0x1, 0x7fff, 0x20, 0x1000, 0x6e, 0x6, 0x8, 0x7, 0x8, 0x101, 0x6, 0xfff, 0x80000001, 0xa8a, 0x3, 0x6, 0x0, 0x800, 0x7, 0x3f, 0x7ff, 0x7, 0x3, 0x1, 0x4, 0x40, 0xffffffff, 0x4, 0x5, 0x3, 0x400, 0x2, 0x4, 0x9, 0x1, 0x400, 0x6, 0x10000, 0x7, 0x80000001, 0x24e9, 0x3b80, 0x83a, 0x3, 0x5, 0x0, 0x2, 0xfdf, 0x20, 0x57f4, 0x1f, 0x0, 0x30b0, 0xb4a, 0x1000, 0x5, 0x4, 0x3f, 0x2, 0x401, 0xd3d0, 0xc2, 0x6b0, 0x9, 0x7, 0x6, 0x5, 0x2bad0000, 0x570, 0x8, 0x1f, 0xd07, 0x6, 0x1, 0x3, 0x7e, 0x6, 0x7, 0x8001, 0x5, 0x0, 0x6, 0x7, 0x283e, 0x20f3, 0x1000, 0x8393, 0x3, 0xfffffffa, 0x80, 0x9, 0x80e7, 0x6, 0x3ff, 0x0, 0x4, 0xf2, 0x36, 0x0, 0x3, 0x8, 0xbd, 0x7, 0x5, 0x2, 0x9, 0x8, 0x8, 0x5, 0x6, 0x3b6d, 0x7, 0x7, 0x4, 0x4, 0x5, 0x2, 0x3, 0xffff, 0x7ff, 0x200, 0x1, 0xe5, 0x7fff, 0x3ff, 0x3, 0xa7, 0x80, 0x8, 0x3ff, 0x9, 0x2, 0xffffffff, 0xfffffffa, 0x3, 0xe7d, 0x100, 0x6, 0x7fffffff, 0x2, 0x10001, 0x6, 0x80000000, 0xd419480a, 0xffff2a7e, 0x5, 0x2c, 0x3ff, 0x0, 0x2, 0x0, 0x3f, 0x7, 0x6, 0x4, 0x40, 0x0, 0x2, 0x677, 0x3, 0x2, 0x59c, 0x8, 0x2, 0xfb39, 0x7, 0x8, 0x1a73, 0x81, 0x7f, 0x1000000, 0x30, 0x9, 0x46, 0x0, 0x1, 0x642, 0x6, 0x7, 0x4, 0x6, 0x8000, 0x6, 0x0, 0x8, 0x10001, 0x0, 0x2, 0x2, 0xfffffffa, 0x1, 0xc15, 0x4, 0x9c, 0x0, 0x20, 0x401, 0x8000, 0xffffffff, 0x10001, 0x3, 0x7fffffff, 0x3, 0x1, 0x9, 0x0, 0x5116, 0xd1, 0x2, 0x9, 0x3, 0x5, 0x7, 0x1, 0x800, 0x3dea, 0x42, 0x8, 0x3ff, 0x2c1, 0x8, 0x3, 0x6b107473, 0x8, 0xf51, 0x7f, 0xda68, 0x3, 0xd0a, 0x83c4, 0x5, 0x75b55f93, 0x8812, 0x5]}]}}, @tclass_kind_options=@c_red={0x8, 0x1, 'red\x00'}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x68, 0x2, [@TCA_ATM_HDR={0x4}, @TCA_ATM_HDR={0x23, 0x3, "8f3807f10537490937d709fdd3300d8ce0e13485a7a2a5e245752c511f0306"}, @TCA_ATM_HDR={0x3c, 0x3, "294d90371231f4f144b75d3c1d4a2b327eca9d0f6a0ad5683b4121a8b06f177e8dbca984d141fe1f7c43647046e3df6ca25e5ebd26ce3e07"}]}}, @tclass_kind_options=@c_netem={0xa, 0x1, 'netem\x00'}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x3}}}, @tclass_kind_options=@c_multiq={0xb, 0x1, 'multiq\x00'}]}, 0x4e0}, 0x1, 0x0, 0x0, 0x4044000}, 0x40001) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) quotactl(0xc4f, &(0x7f00000000c0)='./file0\x00', r9, &(0x7f0000000240)="74934f10026219822fc02e1597f6e17fea9e7b7fe3b257ad9f3e62c9260d21f469d41597119a11247a33e1229e47cf816a83ccbc0182c34f53ae51ce4c348f12dcdc9762d0ee0e341961f92c84b7d893255c9968a82e22bb748a0a0cbd974a44bbaafb8d296d9e7094310471da46909bbfb9f098c1bbac19765139feab9dee") syz_open_dev$binderN(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6480762f72756c6c0230008b6bdb813791d7040ffea43a2e3b2f298f55d2731b51ffff19ee3418043a8799a67c4d47237847918d55be535340ec1a00fd4f5c76a8"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:37:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:55 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb001000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x900000000000000, 0x0) 08:37:55 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]]}, 0x120) 08:37:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xf00000], [], [], [], []]}, 0x585) 08:37:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:55 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]]}, 0x120) 08:37:55 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb100000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xa00000000000000, 0x0) 08:37:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:56 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]]}, 0x120) 08:37:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) fcntl$setflags(r8, 0x2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) 08:37:56 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb101000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xc00000000000000, 0x0) 08:37:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1000000], [], [], [], []]}, 0x585) 08:37:56 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb200000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x1000000000000000, 0x0) 08:37:56 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]]}, 0x120) 08:37:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:56 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]]}, 0x120) 08:37:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x2000000000000000, 0x0) 08:37:56 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb201000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x2300000000000000, 0x0) 08:37:57 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb300000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1800000], [], [], [], []]}, 0x585) 08:37:57 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]]}, 0x120) 08:37:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:57 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb301000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:57 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]]}, 0x120) 08:37:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x3801000000000000, 0x0) 08:37:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:57 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb400000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x3f00000000000000, 0x0) 08:37:58 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]]}, 0x120) 08:37:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x2000000], [], [], [], []]}, 0x585) 08:37:58 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb401000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4000000000000000, 0x0) 08:37:58 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]]}, 0x120) 08:37:58 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb500000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4800000000000000, 0x0) 08:37:59 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]]}, 0x120) 08:37:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x7000000], [], [], [], []]}, 0x585) 08:37:59 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb501000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4c00000000000000, 0x0) 08:37:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x8000000], [], [], [], []]}, 0x585) 08:37:59 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]]}, 0x120) 08:37:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:37:59 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb600000000000000, 0xd, &(0x7f0000000180)=""/238) 08:37:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6800000000000000, 0x0) 08:38:00 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]]}, 0x120) 08:38:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:00 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb601000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x6c00000000000000, 0x0) 08:38:00 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]]}, 0x120) 08:38:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x9000000], [], [], [], []]}, 0x585) 08:38:00 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb700000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:00 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]]}, 0x120) 08:38:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7002000000000000, 0x0) 08:38:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:01 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb701000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:01 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000]]}, 0x120) 08:38:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7400000000000000, 0x0) 08:38:01 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb800000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xa000000], [], [], [], []]}, 0x585) 08:38:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:01 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000]]}, 0x120) 08:38:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7a00000000000000, 0x0) 08:38:02 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb801000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x7fffffffffffffff, 0x0) 08:38:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:02 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb900000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:02 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e000000]]}, 0x120) 08:38:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x8cffffff00000000, 0x0) 08:38:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xc000000], [], [], [], []]}, 0x585) 08:38:03 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xb901000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:03 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]]}, 0x120) 08:38:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xf5ffffff00000000, 0x0) 08:38:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:03 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xba00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:03 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000]]}, 0x120) 08:38:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xf6ffffff00000000, 0x0) 08:38:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xd000000], [], [], [], []]}, 0x585) 08:38:03 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xba01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:03 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]]}, 0x120) 08:38:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfbffffff00000000, 0x0) 08:38:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:04 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbb00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:04 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b000000]]}, 0x120) 08:38:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfeff000000000000, 0x0) 08:38:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:04 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbb01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xe000000], [], [], [], []]}, 0x585) 08:38:04 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000]]}, 0x120) 08:38:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xff0f000000000000, 0x0) 08:38:04 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbc00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffff000000000000, 0x0) 08:38:04 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]]}, 0x120) 08:38:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xf000000], [], [], [], []]}, 0x585) 08:38:05 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbc01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffff1f0000000000, 0x0) 08:38:05 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]]}, 0x120) 08:38:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:05 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbd00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:05 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000]]}, 0x120) 08:38:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x18000000], [], [], [], []]}, 0x585) 08:38:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffffff7f00000000, 0x0) 08:38:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:05 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbd01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:05 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]]}, 0x120) 08:38:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffffffff00000000, 0x0) 08:38:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:05 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbe00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:06 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000]]}, 0x120) 08:38:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1a000000], [], [], [], []]}, 0x585) 08:38:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffffffffa0118000, 0x0) 08:38:06 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbe01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:06 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]]}, 0x120) 08:38:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffffffffffff0700, 0x0) 08:38:06 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbf00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:06 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]]}, 0x120) 08:38:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xfffffffffffff000, 0x0) 08:38:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1b000000], [], [], [], []]}, 0x585) 08:38:06 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]]}, 0x120) 08:38:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:06 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000540)='/dev/vcsu#\x00', 0x5, 0x40000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000780)={0x7, 0x0, 0x10001, 0x4}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000800)={r1, 0xffff}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000001c0)=0x7fffffff, 0x4) r2 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000340)={0x0, 0xdc, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x980906, 0x20, [], @ptr=0x1}}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0106000086a6f3c1fb38fd0c09000000000000cb19297a7b0000"], 0x20}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)={0x118, r7, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x6}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x0, @loopback, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfbe4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x800}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$FUSE_NOTIFY_DELETE(r9, &(0x7f0000000180)={0x2e, 0x6, 0x0, {0x3, 0x5, 0x5, 0x0, 'ext4\x00'}}, 0x2e) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x2a7, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000500b800069903000000070015c006008178a8001600a40002000200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dee1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40d96f69916862de21f2e402053e8ffd22b", 0xd8}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(r10, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb90016f67f00c766bf6e26aef0ea3193db1f2154b0f8472b361fb31cd388df4d739db1ee7bbadfb3fa718572acdd4ed89d657f985b254e2435ce0b9fbb265629aa7f02d56c26cf7065c9e9bc919e5ffc4cd67296689cd52a49bbafae6e902f676ab6f612a1a5a22afbe273fb32430b1f0246beef3aeabd9e189beaf8edb1c12e78c11377106970000000000000000"], 0x90, 0x2) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000002000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socket$inet6(0xa, 0x73a53210650c3680, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000000840)=@ethernet={0x509, @random="6e99e1562c6f"}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="e424dc16a8273e5aa21590e5d18ff9bd6dd7b7c9f2c14ebc998cc5597860163eef5c8b026f9a0885a0f5d7a405d3b0bf96996210c887e7a1d6907a602838ca42dab7266bf608d03529f77c6e1dcbb7dae31526694b8bb617358beb440147b79c38ceb932d5f9efe8e241dbd9ea7e37f873f80fdc2c16825f207b071fc008ce7e60f8b04ec8f2a3c2b07dfd69f20dabda3eafa9c3bd7f8139b2ae71b6", 0x9c}, {&(0x7f0000001980)="65905bfc36175b9d3fc1ff9fd7b7233eda72db", 0x13}], 0x3, &(0x7f0000001a00)=[{0x20, 0x112, 0x7, "d7a51c18aa26fa687d665358"}, {0x40, 0x10f, 0x4, "9612abb330834c5336dd10d3864904936244ab4922f6128ca5cbf6a4ff960472869c0d606e61c025502a31"}, {0xd8, 0x112, 0x2, "cf433e306b19250a3c00ba8c164f0d51338571d408feb74fd79c012d1649d1dabb78c2951eb7abab1321a89a2041162c2775eec2399b024d61a02d517537aed1f7507891249ee7b3d7ca8594651c21df0319530d7cfeeea54c1ca90eab29cbb7d7c708680ec35e1b8060c6d32f5587a4f3caa45e3c120daad29f168e11f1e565fe00dce8feb90ea7d9bed3df1f35a5d7c817cb71a9b1f4a715a0424950f718dcc862a93944c82389075a9abba39428dc1534d4b9e5bed5e66799ce3e41396759c269"}, {0x88, 0x161, 0x1c8, "bdec3f81d2983b27d957a04d73be93a6efc42001f58e946f00be8114c430901386a5cea8de35a282bc8e2f354f50c89ba409758f2a6c4064280994c67dc39792868b70ed3a7138aa326de972da3464edcddf7db070f78bb0d3239ac59af426e33b6a21585367c1721a7e4e0758093402ec"}, {0x1010, 0x117, 0xfffffffb, "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"}, {0x68, 0x10e, 0x1, "228df9902e32ae368c9ad4866b0d90408d80add6746e6386093823d486eff8a8e7bedd7dd45661ca965dde52f6231891a59eb1be34bb49d097993c4dbc6adc6e99f48ce3f6d54289e9b8c2c36daccede4aba5bbe"}], 0x1238}, 0x4000000) 08:38:06 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xbf01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffffffffffffff7f, 0x0) 08:38:07 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]]}, 0x120) 08:38:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c00"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:07 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc000000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0xffffffffffffffff, 0x0) 08:38:07 executing program 1: pipe(0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r3}, 0x0) r4 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) dup2(0xffffffffffffffff, r4) ppoll(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000380)="df", 0x1}], 0x1, &(0x7f0000000980)=ANY=[@ANYBLOB="300000ee400000008400e2ff0000e2ffffffffff090000100000000000", @ANYRES32=0x0], 0x30}, 0x0) fsetxattr$system_posix_acl(r7, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="0200000001006b8000000000020001cfbb6c9a20ed4fccef462d8a81e6d2a5e4a0e4c4a6c3784e199b82e7e6cc782282dce8069d792600cbf6c25cd13276e8506295e7486888770a8d0600e3d4000240f25b835f4f878f7e34c345ff3f7b45ad32c5044651b5f6cea3fea54f9da010908dce5b8f12e0fd74ddd0a8b4a056f144e6575cd984aa489257576560741d9343e6d985e2094bab", @ANYRES32, @ANYRES32=r7, @ANYBLOB, @ANYBLOB='B', @ANYRES32, @ANYRESHEX=r0, @ANYRESDEC=r8], 0x8, 0x1) r9 = socket(0xa, 0x3, 0x8) syz_open_dev$amidi(0x0, 0x9c4, 0x70000) r10 = gettid() sched_setscheduler(0x0, 0x5, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000480)) sendmsg$key(r9, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRESDEC=r10]], 0xfffffffffffffe56}}, 0x20004850) r11 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r12, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r13 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r13) r14 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r15) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r15, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0xb, 0x2, 0xff}, &(0x7f00000005c0)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, 0xffffffffffffffff, 0x0, 0x0, 0x0, r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r16}, 0xc) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x7}, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={r17, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000900)='syz1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r18 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r18, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r18, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r18, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r19 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r20 = socket$inet_tcp(0x2, 0x1, 0x0) r21 = dup3(0xffffffffffffffff, r20, 0x0) write$FUSE_IOCTL(r21, &(0x7f0000000240)={0x20, 0x0, 0xffffffffffffffff, {0x0, 0x4, 0x0, 0xfff}}, 0xffffffffffffffb2) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000280)=""/11) r22 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) pwritev(r22, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r19, 0x4c00, r22) sendfile(r18, r19, 0x0, 0x102000004) [ 2592.219483] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 2592.455115] EXT4-fs (loop1): bad geometry: block count 580964351930795064 exceeds size of device (66048 blocks) 08:38:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x28000000], [], [], [], []]}, 0x585) 08:38:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c00"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:07 executing program 0: lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x1, 0xffff}]}, 0xc, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x77) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/de\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:07 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]]}, 0x120) 08:38:07 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc001000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:07 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]]}, 0x120) 08:38:07 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc100000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c00"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465562f6e62643000887474b7ef385082d83741af8b621c585c2ed76ff1b82518966a350a24c7e1dccd044dc61175c0d6cbbc2d6722327801eec3a17da069a72b237febaefcbe84bd37083683e2ab7c71c6422d1246d8749ae23795f1ef707ab1fe396bd91fc8a0ab2a39d94b7b9ea5d361fd2ae15eaecf60c2a047efa0f058117a4c091fbbf14ac33cd96e903da104"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:08 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc101000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2593.278600] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.278668] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.278760] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.278807] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.438631] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.438769] protocol 88fb is buggy, dev hsr_slave_1 08:38:08 executing program 1: pipe(0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r3}, 0x0) r4 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) dup2(0xffffffffffffffff, r4) ppoll(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000380)="df", 0x1}], 0x1, &(0x7f0000000980)=ANY=[@ANYBLOB="300000ee400000008400e2ff0000e2ffffffffff090000100000000000", @ANYRES32=0x0], 0x30}, 0x0) fsetxattr$system_posix_acl(r7, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="0200000001006b8000000000020001cfbb6c9a20ed4fccef462d8a81e6d2a5e4a0e4c4a6c3784e199b82e7e6cc782282dce8069d792600cbf6c25cd13276e8506295e7486888770a8d0600e3d4000240f25b835f4f878f7e34c345ff3f7b45ad32c5044651b5f6cea3fea54f9da010908dce5b8f12e0fd74ddd0a8b4a056f144e6575cd984aa489257576560741d9343e6d985e2094bab", @ANYRES32, @ANYRES32=r7, @ANYBLOB, @ANYBLOB='B', @ANYRES32, @ANYRESHEX=r0, @ANYRESDEC=r8], 0x8, 0x1) r9 = socket(0xa, 0x3, 0x8) syz_open_dev$amidi(0x0, 0x9c4, 0x70000) r10 = gettid() sched_setscheduler(0x0, 0x5, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000480)) sendmsg$key(r9, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRESDEC=r10]], 0xfffffffffffffe56}}, 0x20004850) r11 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r12, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r13 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r13) r14 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r15) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r15, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0xb, 0x2, 0xff}, &(0x7f00000005c0)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, 0xffffffffffffffff, 0x0, 0x0, 0x0, r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r16}, 0xc) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x7}, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={r17, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000900)='syz1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r18 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r18, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r18, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r18, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r19 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r20 = socket$inet_tcp(0x2, 0x1, 0x0) r21 = dup3(0xffffffffffffffff, r20, 0x0) write$FUSE_IOCTL(r21, &(0x7f0000000240)={0x20, 0x0, 0xffffffffffffffff, {0x0, 0x4, 0x0, 0xfff}}, 0xffffffffffffffb2) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000280)=""/11) r22 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) pwritev(r22, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r19, 0x4c00, r22) sendfile(r18, r19, 0x0, 0x102000004) 08:38:08 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc200000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2b6465762f6e625b64303ed5a3bc5d73583b05fba5f099f09a138085af0c9c7af1510db233123aec6aaa57e508f242ab9ad3103e5926ec0f542124302deca3a0d2b73c4f03c464ac1fc210585f534f271b20de8e558d79b198d595526ddc987439b669d551035f01de59d451f6db21db5e63ac71e6cbdc003714bee78a62f47948cecd9dddb1e03d73662538"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:08 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]]}, 0x120) 08:38:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x3e000000], [], [], [], []]}, 0x585) 08:38:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465f62f6e66643000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:08 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]]}, 0x120) 08:38:08 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc201000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2594.158577] protocol 88fb is buggy, dev hsr_slave_0 [ 2594.163747] protocol 88fb is buggy, dev hsr_slave_1 [ 2594.168958] protocol 88fb is buggy, dev hsr_slave_0 [ 2594.174105] protocol 88fb is buggy, dev hsr_slave_1 08:38:09 executing program 1: pipe(0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r3}, 0x0) r4 = memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x5) dup2(0xffffffffffffffff, r4) ppoll(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000380)="df", 0x1}], 0x1, &(0x7f0000000980)=ANY=[@ANYBLOB="300000ee400000008400e2ff0000e2ffffffffff090000100000000000", @ANYRES32=0x0], 0x30}, 0x0) fsetxattr$system_posix_acl(r7, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="0200000001006b8000000000020001cfbb6c9a20ed4fccef462d8a81e6d2a5e4a0e4c4a6c3784e199b82e7e6cc782282dce8069d792600cbf6c25cd13276e8506295e7486888770a8d0600e3d4000240f25b835f4f878f7e34c345ff3f7b45ad32c5044651b5f6cea3fea54f9da010908dce5b8f12e0fd74ddd0a8b4a056f144e6575cd984aa489257576560741d9343e6d985e2094bab", @ANYRES32, @ANYRES32=r7, @ANYBLOB, @ANYBLOB='B', @ANYRES32, @ANYRESHEX=r0, @ANYRESDEC=r8], 0x8, 0x1) r9 = socket(0xa, 0x3, 0x8) syz_open_dev$amidi(0x0, 0x9c4, 0x70000) r10 = gettid() sched_setscheduler(0x0, 0x5, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x80000000, &(0x7f0000000480)) sendmsg$key(r9, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRESDEC=r10]], 0xfffffffffffffe56}}, 0x20004850) r11 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r12, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r13 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r13) r14 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r15) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r15, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0xb, 0x2, 0xff}, &(0x7f00000005c0)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, 0xffffffffffffffff, 0x0, 0x0, 0x0, r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r16}, 0xc) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x7}, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={r17, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000900)='syz1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r18 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r18, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r18, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r18, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r19 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r20 = socket$inet_tcp(0x2, 0x1, 0x0) r21 = dup3(0xffffffffffffffff, r20, 0x0) write$FUSE_IOCTL(r21, &(0x7f0000000240)={0x20, 0x0, 0xffffffffffffffff, {0x0, 0x4, 0x0, 0xfff}}, 0xffffffffffffffb2) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000280)=""/11) r22 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) pwritev(r22, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r19, 0x4c00, r22) sendfile(r18, r19, 0x0, 0x102000004) 08:38:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x7f000000], [], [], [], []]}, 0x585) 08:38:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$IPC_RMID(r2, 0x0) 08:38:09 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]]}, 0x120) 08:38:09 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc300000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e000004040002"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:09 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc301000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:09 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]]}, 0x120) [ 2594.435319] nbd_handle_cmd: 2 callbacks suppressed [ 2594.435335] block nbd0: Attempted send on invalid socket 08:38:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x100, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0x9, 0x1]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e000004040002"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2594.435357] print_req_error: 2 callbacks suppressed [ 2594.435366] print_req_error: I/O error, dev nbd0, sector 64 [ 2594.435670] block nbd0: Attempted send on invalid socket [ 2594.435686] print_req_error: I/O error, dev nbd0, sector 256 [ 2594.435730] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2594.435967] block nbd0: Attempted send on invalid socket 08:38:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e000004040002"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2594.435982] print_req_error: I/O error, dev nbd0, sector 512 [ 2594.436024] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2594.436036] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2594.436044] UDF-fs: Scanning with blocksize 512 failed [ 2594.436747] block nbd0: Attempted send on invalid socket [ 2594.436765] print_req_error: I/O error, dev nbd0, sector 64 [ 2594.437923] block nbd0: Attempted send on invalid socket [ 2594.437938] print_req_error: I/O error, dev nbd0, sector 512 [ 2594.437981] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2594.438144] block nbd0: Attempted send on invalid socket [ 2594.438159] print_req_error: I/O error, dev nbd0, sector 1024 [ 2594.438201] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2594.438213] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2594.438221] UDF-fs: Scanning with blocksize 1024 failed [ 2594.439108] block nbd0: Attempted send on invalid socket [ 2594.439123] print_req_error: I/O error, dev nbd0, sector 64 [ 2594.440599] block nbd0: Attempted send on invalid socket [ 2594.440614] print_req_error: I/O error, dev nbd0, sector 1024 [ 2594.440655] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2594.440799] block nbd0: Attempted send on invalid socket [ 2594.440813] print_req_error: I/O error, dev nbd0, sector 2048 [ 2594.440853] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2594.440865] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2594.440872] UDF-fs: Scanning with blocksize 2048 failed [ 2594.441151] block nbd0: Attempted send on invalid socket [ 2594.441166] print_req_error: I/O error, dev nbd0, sector 64 [ 2594.441607] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2594.441777] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2594.441788] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2594.441796] UDF-fs: Scanning with blocksize 4096 failed [ 2594.441806] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:38:10 executing program 1: socket(0x2, 0xa, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x4, @rand_addr="f38857826b359b7a61bc98c766d3ef5b", 0x8, 0x2}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff02000000", 0x1e}], 0x1}, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x40) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000200)={{0x9, 0xfc}, 'port1\x00', 0xda8b2f4e281172d8, 0x88023, 0x2, 0x5, 0x1, 0x8, 0x1fe, 0x0, 0x0, 0x1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) [ 2594.767758] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2594.768354] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2594.768387] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2594.768395] UDF-fs: Scanning with blocksize 512 failed [ 2594.780548] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2594.780942] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2594.780954] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2594.780962] UDF-fs: Scanning with blocksize 1024 failed [ 2594.784707] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2594.786283] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2594.786296] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2594.786304] UDF-fs: Scanning with blocksize 2048 failed [ 2594.786789] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2594.786959] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2594.786970] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2594.786978] UDF-fs: Scanning with blocksize 4096 failed 08:38:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x9b000000], [], [], [], []]}, 0x585) 08:38:10 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc400000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x100000000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2594.786988] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2595.300889] audit: type=1400 audit(1578904690.082:179): avc: denied { map } for pid=5224 comm="syz-executor.1" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 08:38:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:10 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]]}, 0x120) 08:38:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x3, "a11fd9bb777ed6d2de013aa84c1780812dde64019c3679140f98742d991c188999137e2c0c273c01ce5ee4a98e9a5f9621977495adc63b5e42cfed5f869c9b9c3762653da39cff6f836d3d8c2f820218e7f36d69edfe4f612f003ba171580d5d229a27995ec89a2ae6ea35537a994f882cb14b30ea1e81f4ffce42d406d795b1667439abc3912178aa17fed740c80915b5df43ad2e40db2e0c07023314ebb582148f97bf4b7f329a3f160dfa8dc19707f955096b143bd08da435072e87ba883dfc7fec35c82353166a54e432bd274068adc33e99bed553bae5b0410241e3d969c47980bfb66acc42eae3297dadf62b3f5d48f2bbbae626416b7f89ba77f540b4", 0xb9, 0x4, 0x0, 0x2, 0x100000000, 0x1}}}, 0x128) dup(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f00000001c0)={r7, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000440)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYBLOB="8d00000026bfeb04221d1baced995e5151026790bdee160ae020fd68d6226011f7f979933b4d93e9f47dfda66c5b2cd6d308ba4bdab3de4a4774cd64574ecb55d1b1bb0da58e1f650fb6e6a43b97278e05cb341c6262af53d60b70950300eec0ca8230f7f22cc27f6ae97a578a4e0894708ce23efe8913d26453e70773fdcbf4c2275cedb7453ec59dca7c14dfa2b033"], 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = getpid() ioctl$sock_FIOSETOWN(r8, 0x8901, &(0x7f00000000c0)=r9) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x200004) sendfile(r0, r10, 0x0, 0x80001d00c0d0) [ 2595.532677] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2595.567129] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:38:10 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc401000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2595.603993] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2595.604003] UDF-fs: Scanning with blocksize 512 failed 08:38:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100, 0x1) r2 = socket$inet(0x2, 0x80000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x682, [0x0, 0x200001c0, 0x200005dc, 0x2000060c], 0x0, &(0x7f0000000080), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0x2, 0x2, [{0xadf0717752e6ad57, 0x10, 0x0, 'vlan0\x00', 'veth0_vlan\x00', 'lo\x00', 'bond_slave_1\x00', @remote, [0x0, 0x6feba8ac1b67058b, 0x0, 0x1fe, 0x1fe, 0x101], @empty, [0xff, 0xff, 0x0, 0xff, 0x1fe, 0xff], 0x10e, 0x10e, 0x186, [@cgroup0={{'cgroup\x00', 0x0, 0x8}, {{0x20, 0x1}}}, @stp={{'stp\x00', 0x0, 0x48}, {{0xd8, {0x1, 0x4, 0xfc00, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe9f6db03ec61395e}, [0xff, 0x17e, 0xff, 0xff], 0x8, 0x1, 0x2, 0x2, @dev={[], 0x21}, [0x0, 0x0, 0x0, 0x80, 0xff], 0x4e22, 0x4e22, 0x40f4, 0x1f, 0xfa4, 0x3, 0x80, 0x3db, 0x0, 0x3}, 0xa2, 0x8}}}], [], @common=@nflog={'nflog\x00', 0x50, {{0x3ae, 0x7, 0x44a, 0x0, 0x0, "4ba51b392c112d89b7a0885e5349f21ae77f84fe242bc1d342c94135fd68f31fcf0576303c0858e507250d77c3e871c3e25b6675e32aefd5c1c594cf90cd46ed"}}}}, {0x5, 0x51, 0x1b, 'caif0\x00', 'macvlan0\x00', 'ip6gretap0\x00', 'team_slave_1\x00', @random="c507048bc702", [0x0, 0x0, 0xff], @broadcast, [0x0, 0xff, 0xff, 0x80], 0xe6, 0x136, 0x266, [@ip={{'ip\x00', 0x0, 0x20}, {{@remote, @remote, 0xff00007f, 0xff, 0x1, 0x62, 0x10, 0x21, 0x4e20, 0x4e24, 0x4e21, 0x4e24}}}, @vlan={{'vlan\x00', 0x0, 0x8}, {{0x4, 0x5, 0x1c, 0x2, 0x1}}}], [@common=@log={'log\x00', 0x28, {{0x1, "5c3dc748c5bfc50c85a442f829e407e3b4fe9efac6f195efa054d6079ba0", 0x2}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x4a, 'system_u:object_r:inetd_child_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0xe994de4de392a198, 0x4, 0x8864, 'vcan0\x00', '\x00', 'veth1_virt_wifi\x00', 'veth0_to_bond\x00', @remote, [0xff, 0xff, 0xff, 0x0, 0x7f, 0xff], @empty, [0x0, 0x0, 0x0, 0xff, 0x7f, 0xff], 0x12e, 0x15e, 0x1d6, [@stp={{'stp\x00', 0x0, 0x48}, {{0x81, {0x8, 0x200, 0x0, @broadcast, [0x0, 0x1fe, 0xff, 0xff, 0x1fe], 0x3, 0x0, 0x3, 0x0, @local, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], 0x4e22, 0x4e23, 0x8, 0x0, 0x3ff, 0x0, 0x800, 0x2, 0x80, 0x9}, 0x0, 0x4}}}, @ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@rand_addr="8eb5fe01a070d35b544e8de62df74074", [0xff000000, 0x0, 0x1000000fe, 0xff000000], 0x4e23, 0x6, 0x0, 0x4e23, 0x20, 0x8}}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x8}}}], @common=@nflog={'nflog\x00', 0x50, {{0x2e740353, 0xffff, 0x6, 0x0, 0x0, "e530e8f7232ec2329cd6b2d92aa2f4d82f8d0e868eec93c4cf680ca74a4f5511f79e3b27dfdeb6511efffc332b2ac9b6c1b4e11deb05ba7c56377547494673b2"}}}}]}]}, 0x6fa) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2595.607482] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2595.608668] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2595.608680] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2595.608688] UDF-fs: Scanning with blocksize 1024 failed [ 2595.609276] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2595.610944] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2595.610958] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2595.610965] UDF-fs: Scanning with blocksize 2048 failed [ 2595.614335] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2595.614547] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2595.614557] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2595.614564] UDF-fs: Scanning with blocksize 4096 failed 08:38:10 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc500000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2595.614573] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:38:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xf0000000000000], [], [], [], []]}, 0x585) 08:38:10 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]]}, 0x120) 08:38:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x3, "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", 0xb9, 0x4, 0x0, 0x2, 0x100000000, 0x1}}}, 0x128) dup(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f00000001c0)={r7, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000440)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYBLOB="8d00000026bfeb04221d1baced995e5151026790bdee160ae020fd68d6226011f7f979933b4d93e9f47dfda66c5b2cd6d308ba4bdab3de4a4774cd64574ecb55d1b1bb0da58e1f650fb6e6a43b97278e05cb341c6262af53d60b70950300eec0ca8230f7f22cc27f6ae97a578a4e0894708ce23efe8913d26453e70773fdcbf4c2275cedb7453ec59dca7c14dfa2b033"], 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = getpid() ioctl$sock_FIOSETOWN(r8, 0x8901, &(0x7f00000000c0)=r9) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x200004) sendfile(r0, r10, 0x0, 0x80001d00c0d0) 08:38:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) 08:38:11 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]]}, 0x120) 08:38:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:11 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc501000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) faccessat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x1600) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x280, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2, 0xb3ed087f0019a2bf) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f641cc25df762e4f000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:11 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]]}, 0x120) 08:38:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x3, "a11fd9bb777ed6d2de013aa84c1780812dde64019c3679140f98742d991c188999137e2c0c273c01ce5ee4a98e9a5f9621977495adc63b5e42cfed5f869c9b9c3762653da39cff6f836d3d8c2f820218e7f36d69edfe4f612f003ba171580d5d229a27995ec89a2ae6ea35537a994f882cb14b30ea1e81f4ffce42d406d795b1667439abc3912178aa17fed740c80915b5df43ad2e40db2e0c07023314ebb582148f97bf4b7f329a3f160dfa8dc19707f955096b143bd08da435072e87ba883dfc7fec35c82353166a54e432bd274068adc33e99bed553bae5b0410241e3d969c47980bfb66acc42eae3297dadf62b3f5d48f2bbbae626416b7f89ba77f540b4", 0xb9, 0x4, 0x0, 0x2, 0x100000000, 0x1}}}, 0x128) dup(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f00000001c0)={r7, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000440)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYBLOB="8d00000026bfeb04221d1baced995e5151026790bdee160ae020fd68d6226011f7f979933b4d93e9f47dfda66c5b2cd6d308ba4bdab3de4a4774cd64574ecb55d1b1bb0da58e1f650fb6e6a43b97278e05cb341c6262af53d60b70950300eec0ca8230f7f22cc27f6ae97a578a4e0894708ce23efe8913d26453e70773fdcbf4c2275cedb7453ec59dca7c14dfa2b033"], 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = getpid() ioctl$sock_FIOSETOWN(r8, 0x8901, &(0x7f00000000c0)=r9) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x200004) sendfile(r0, r10, 0x0, 0x80001d00c0d0) 08:38:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2596.573400] Unknown ioctl 19456 08:38:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x100000000000000], [], [], [], []]}, 0x585) 08:38:11 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc600000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:11 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000]]}, 0x120) 08:38:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="6b632e815baf2767a1f3f9cda9093f6e62643000bc60ea000000000000003a76630cfaf24b761da303ebdb0000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x3, "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", 0xb9, 0x4, 0x0, 0x2, 0x100000000, 0x1}}}, 0x128) dup(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f00000001c0)={r7, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000440)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYBLOB="8d00000026bfeb04221d1baced995e5151026790bdee160ae020fd68d6226011f7f979933b4d93e9f47dfda66c5b2cd6d308ba4bdab3de4a4774cd64574ecb55d1b1bb0da58e1f650fb6e6a43b97278e05cb341c6262af53d60b70950300eec0ca8230f7f22cc27f6ae97a578a4e0894708ce23efe8913d26453e70773fdcbf4c2275cedb7453ec59dca7c14dfa2b033"], 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = getpid() ioctl$sock_FIOSETOWN(r8, 0x8901, &(0x7f00000000c0)=r9) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x200004) sendfile(r0, r10, 0x0, 0x80001d00c0d0) 08:38:11 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc601000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465762f9e5964ed67766e74643000892f7237f6f8e4e3328ad75ce08d14"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) r3 = fcntl$getown(r2, 0x9) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) setpgid(r3, r5) 08:38:11 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000]]}, 0x120) 08:38:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x180000000000000], [], [], [], []]}, 0x585) 08:38:12 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc700000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:12 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00000000000000]]}, 0x120) 08:38:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x2}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:12 executing program 1: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000040), 0x0, 0x4) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7fffffff}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000002000000000100000001000000004000000040000080000000101308026d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) inotify_init() 08:38:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465766e627d300032c353640553becd"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:12 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc701000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="ca4f3bbe0601ce8977158066a1203f3616c5801890511443a13d429752eb05878361028256b2832547047dadb5d1965deefe49818da95e415eb25e590d172fd31268cece81c99cd281"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:12 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc800000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="64fe7f3a8572ef6973"]) 08:38:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x200000000000000], [], [], [], []]}, 0x585) 08:38:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:12 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]]}, 0x120) 08:38:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400203) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) 08:38:12 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc801000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2598.086073] jfs: Unrecognized mount option "dþ:…rïis" or missing value 08:38:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:12 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000]]}, 0x120) [ 2598.169490] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2598.191938] UDF-fs: Scanning with blocksize 512 failed 08:38:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = getpid() setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x5}, 0x10) r4 = inotify_init() r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000040)) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000100)) fsetxattr$security_ima(r4, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000006000000000000"], 0xd, 0x7) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(r0, r6, 0x0, 0x80001d00c0d0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:38:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x4000, 0x0) 08:38:13 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc900000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2598.206406] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2598.206417] UDF-fs: Scanning with blocksize 1024 failed [ 2598.206683] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2598.206693] UDF-fs: Scanning with blocksize 2048 failed [ 2598.206929] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2598.206943] UDF-fs: Scanning with blocksize 4096 failed [ 2598.531911] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2598.608102] UDF-fs: Scanning with blocksize 512 failed [ 2598.623622] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2598.658811] UDF-fs: Scanning with blocksize 1024 failed [ 2598.675586] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2598.688166] UDF-fs: Scanning with blocksize 2048 failed [ 2598.698074] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 2598.705795] UDF-fs: Scanning with blocksize 4096 failed 08:38:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x700000000000000], [], [], [], []]}, 0x585) 08:38:13 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]]}, 0x120) 08:38:13 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xc901000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:13 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00000000000000]]}, 0x120) 08:38:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$dsp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dsp\x00', 0x80281, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000040)) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:13 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xca00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = getpid() setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x5}, 0x10) r4 = inotify_init() r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000040)) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000100)) fsetxattr$security_ima(r4, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000006000000000000"], 0xd, 0x7) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(r0, r6, 0x0, 0x80001d00c0d0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:38:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:14 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xca01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:14 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000]]}, 0x120) 08:38:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="a26465932f6e62643000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 08:38:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x800000000000000], [], [], [], []]}, 0x585) 08:38:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:14 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xcb00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000080)={0x0, @reserved}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f6e62643000e6e6dc3f1cbdbabf755addb29023f9be750697873fbfdcec9fbe4fccd207508e65ec762bf14e907a95613240fd5c8b4a4b2f750689b4bc54f9fd0a0dbce2e675e543879624705448be5df3a2c09e7ceb0e349db1fa7c3348a77be19b4fafcf88c608b8062e6cbca8d69c2e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2599.700916] nbd_handle_cmd: 26 callbacks suppressed 08:38:14 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xcb01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2599.700931] block nbd0: Attempted send on invalid socket [ 2599.700948] print_req_error: 26 callbacks suppressed [ 2599.700958] print_req_error: I/O error, dev nbd0, sector 64 [ 2599.702736] block nbd0: Attempted send on invalid socket [ 2599.702754] print_req_error: I/O error, dev nbd0, sector 256 [ 2599.702942] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2599.703205] block nbd0: Attempted send on invalid socket [ 2599.703219] print_req_error: I/O error, dev nbd0, sector 512 [ 2599.703465] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2599.703476] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2599.703485] UDF-fs: Scanning with blocksize 512 failed [ 2599.703994] block nbd0: Attempted send on invalid socket [ 2599.704009] print_req_error: I/O error, dev nbd0, sector 64 [ 2599.704930] block nbd0: Attempted send on invalid socket [ 2599.704945] print_req_error: I/O error, dev nbd0, sector 512 [ 2599.705827] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2599.706039] block nbd0: Attempted send on invalid socket [ 2599.706054] print_req_error: I/O error, dev nbd0, sector 1024 [ 2599.706246] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2599.706259] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2599.706268] UDF-fs: Scanning with blocksize 1024 failed [ 2599.706608] block nbd0: Attempted send on invalid socket [ 2599.706623] print_req_error: I/O error, dev nbd0, sector 64 [ 2599.708238] block nbd0: Attempted send on invalid socket [ 2599.708254] print_req_error: I/O error, dev nbd0, sector 1024 [ 2599.718949] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2599.719218] block nbd0: Attempted send on invalid socket [ 2599.719244] print_req_error: I/O error, dev nbd0, sector 2048 [ 2599.721054] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2599.721070] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2599.721077] UDF-fs: Scanning with blocksize 2048 failed [ 2599.721400] block nbd0: Attempted send on invalid socket [ 2599.721417] print_req_error: I/O error, dev nbd0, sector 64 [ 2599.724392] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2599.724797] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2599.724810] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2599.724818] UDF-fs: Scanning with blocksize 4096 failed [ 2599.724827] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:38:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = getpid() setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x5}, 0x10) r4 = inotify_init() r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000040)) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000100)) fsetxattr$security_ima(r4, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000006000000000000"], 0xd, 0x7) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(r0, r6, 0x0, 0x80001d00c0d0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:38:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64654ef5af7e3cb47f"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:15 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xcc00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:15 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]]}, 0x120) 08:38:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x900000000000000], [], [], [], []]}, 0x585) 08:38:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x30, 0x0) 08:38:15 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]]}, 0x120) 08:38:15 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xcc01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:15 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]]}, 0x120) 08:38:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = getpid() setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x5}, 0x10) r4 = inotify_init() r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000040)) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000100)) fsetxattr$security_ima(r4, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000006000000000000"], 0xd, 0x7) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(r0, r6, 0x0, 0x80001d00c0d0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:38:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x6d, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000080)={r7, 0x3, 0xfffffffa, 0xd1, 0xaf8, 0xffff, 0x3, 0x7ff, {0x0, @in={{0x2, 0x4e20, @loopback}}, 0x3, 0x6, 0x4, 0x41e0, 0xfffffffb}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000200)={0x0, 0x2fdd0a930f1c41dd, 0x361, 0x9, r8}, &(0x7f0000000240)=0x10) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:16 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:16 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xcd00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:16 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]]}, 0x120) 08:38:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xa00000000000000], [], [], [], []]}, 0x585) [ 2601.281525] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2601.291299] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2601.301247] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2601.308270] UDF-fs: Scanning with blocksize 512 failed [ 2601.314836] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2601.324988] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2601.334298] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2601.342326] UDF-fs: Scanning with blocksize 1024 failed [ 2601.342938] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:16 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2601.343178] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2601.343190] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:38:16 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xcd01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2601.343195] UDF-fs: Scanning with blocksize 2048 failed [ 2601.343740] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x6, &(0x7f0000000100)="ccdc1a906d861f016d03c5bf47b52230d1852361333779d4a5bd8e0a46126c47f866a51268428a7ae213", 0x22) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000080)=[{}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2601.343889] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2601.343899] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2601.343906] UDF-fs: Scanning with blocksize 4096 failed [ 2601.343916] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:38:16 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:16 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xce00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:16 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]]}, 0x120) [ 2601.661633] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2601.661916] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2601.661928] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2601.661936] UDF-fs: Scanning with blocksize 512 failed [ 2601.662756] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2601.662959] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2601.662970] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2601.662977] UDF-fs: Scanning with blocksize 1024 failed [ 2601.669691] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000040)={0x18003005, 0x7fff, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f6ed7fbbfa862643000be232ba82eb684000f0616e57509896cace2ff03fe70298522e03800215a4e60a93e35910616021139c92aa0e3e181c2b6334237e61f09df029bb63bc63d365b49f9d9f65ed59082ac9a9cc8cc8663e37cee1d0f0b1605d6bc12aefc47a01444ce7d60bcc9a36f83576faefd620f5768c1d896a83a3efd802c3ed9ecc85720e35dd579c332076b205dea6b8609c95894de96567c966fb712f2c2fc34f2e869badb67f4a99a3c79aac18a084ce415ed5253aec983c66c5a55aa4b91"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:38:17 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xce01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2601.669865] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2601.669878] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2601.669885] UDF-fs: Scanning with blocksize 2048 failed [ 2601.670356] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2601.677478] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2601.677500] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:38:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x2000000000010d, 0xa, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) accept4(r2, &(0x7f00000000c0)=@nfc_llcp, &(0x7f00000001c0)=0x80, 0x800) uselib(&(0x7f0000000080)='./file0\x00') [ 2601.677508] UDF-fs: Scanning with blocksize 4096 failed [ 2601.677517] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2602.524687] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xc00000000000000], [], [], [], []]}, 0x585) 08:38:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:38:17 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xcf00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:17 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]]}, 0x120) [ 2602.576499] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2602.633603] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2602.666452] UDF-fs: Scanning with blocksize 512 failed 08:38:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 2602.673405] Dev loop1: unable to read RDB block 1 [ 2602.674135] loop1: unable to read partition table [ 2602.675340] loop1: partition table beyond EOD, truncated 08:38:17 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xcf01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2602.675539] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2602.724174] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2602.759414] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2602.759432] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2602.759440] UDF-fs: Scanning with blocksize 1024 failed [ 2602.786384] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:17 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]]}, 0x120) [ 2602.884355] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 08:38:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000040)={0x18003005, 0x7fff, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2602.943156] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:38:17 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd000000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xd00000000000000], [], [], [], []]}, 0x585) [ 2602.988633] UDF-fs: Scanning with blocksize 2048 failed [ 2603.011823] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 2603.060463] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2603.084588] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2603.116981] UDF-fs: Scanning with blocksize 4096 failed [ 2603.132372] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:38:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000100)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='udf\x00', 0x4, 0x0) 08:38:18 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]]}, 0x120) 08:38:18 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd001000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 08:38:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 08:38:18 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd100000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2603.520562] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 2603.520581] UDF-fs: Scanning with blocksize 512 failed [ 2603.521353] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 2603.521424] UDF-fs: Scanning with blocksize 1024 failed [ 2603.527814] Dev loop1: unable to read RDB block 1 [ 2603.529773] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 2603.539354] loop1: unable to read partition table [ 2603.590581] loop1: partition table beyond EOD, truncated [ 2603.591359] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000040)={0x18003005, 0x7fff, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xe00000000000000], [], [], [], []]}, 0x585) [ 2603.606483] UDF-fs: Scanning with blocksize 2048 failed 08:38:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/d\b\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 2603.612854] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 2603.612866] UDF-fs: Scanning with blocksize 4096 failed 08:38:18 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]]}, 0x120) 08:38:18 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd101000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:38:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f00000001c0)={0xc7c3, 0x8, 0x3, 0x401, [], [], [], 0x2, 0x1000, 0x1, 0x53, "81b89f979e1beae51e748aac3563fbc6"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:19 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd200000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:19 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]]}, 0x120) 08:38:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 2604.396540] Dev loop1: unable to read RDB block 1 [ 2604.409551] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2604.421002] loop1: unable to read partition table 08:38:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0xf00000000000000], [], [], [], []]}, 0x585) [ 2604.434473] loop1: partition table beyond EOD, truncated [ 2604.450151] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2604.493565] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2604.504309] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2604.517548] UDF-fs: Scanning with blocksize 512 failed [ 2604.521696] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000040)={0x18003005, 0x7fff, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:19 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd201000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2604.522571] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2604.522583] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found 08:38:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2604.522591] UDF-fs: Scanning with blocksize 1024 failed [ 2604.541155] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2604.542574] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2604.542588] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2604.542596] UDF-fs: Scanning with blocksize 2048 failed [ 2604.544849] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:19 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd300000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2604.545178] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2604.545190] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2604.545199] UDF-fs: Scanning with blocksize 4096 failed [ 2604.545209] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:38:19 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]]}, 0x120) 08:38:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:19 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd301000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:20 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]]}, 0x120) [ 2605.290784] Dev loop1: unable to read RDB block 1 [ 2605.311203] loop1: unable to read partition table [ 2605.329342] loop1: partition table beyond EOD, truncated 08:38:20 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd400000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2605.356796] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1800000000000000], [], [], [], []]}, 0x585) 08:38:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000040)={0x18003005, 0x7fff, 0x7}) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:20 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]]}, 0x120) 08:38:20 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd401000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:20 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]]}, 0x120) 08:38:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1a00000000000000], [], [], [], []]}, 0x585) [ 2605.760806] Dev loop1: unable to read RDB block 1 [ 2605.784847] loop1: unable to read partition table 08:38:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2605.806728] loop1: partition table beyond EOD, truncated [ 2605.829770] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:20 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd500000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:20 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a]]}, 0x120) 08:38:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 08:38:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x1b00000000000000], [], [], [], []]}, 0x585) 08:38:20 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd501000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:21 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b]]}, 0x120) [ 2606.201052] Dev loop1: unable to read RDB block 1 [ 2606.214980] loop1: unable to read partition table 08:38:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 08:38:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:21 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd600000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2606.258877] loop1: partition table beyond EOD, truncated [ 2606.261588] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:21 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e]]}, 0x120) [ 2606.529114] Dev loop1: unable to read RDB block 1 [ 2606.540368] loop1: unable to read partition table 08:38:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) [ 2606.584239] loop1: partition table beyond EOD, truncated [ 2606.612431] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x2800000000000000], [], [], [], []]}, 0x585) 08:38:21 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd601000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c}]}, 0x28}}, 0x0) 08:38:21 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b]]}, 0x120) 08:38:21 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd700000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c}]}, 0x28}}, 0x0) [ 2606.900547] Dev loop1: unable to read RDB block 1 [ 2606.900576] loop1: unable to read partition table [ 2606.900633] loop1: partition table beyond EOD, truncated [ 2606.900654] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2607.197111] Dev loop1: unable to read RDB block 1 [ 2607.197146] loop1: unable to read partition table 08:38:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd701000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2607.197231] loop1: partition table beyond EOD, truncated [ 2607.197249] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c}]}, 0x28}}, 0x0) 08:38:22 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]]}, 0x120) [ 2607.510635] Dev loop1: unable to read RDB block 1 [ 2607.525893] loop1: unable to read partition table [ 2607.549008] loop1: partition table beyond EOD, truncated 08:38:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd800000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2607.568624] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x3e00000000000000], [], [], [], []]}, 0x585) 08:38:22 executing program 5 (fault-call:9 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:22 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180]]}, 0x120) 08:38:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd801000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2607.792094] FAULT_INJECTION: forcing a failure. [ 2607.792094] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.909824] CPU: 1 PID: 15351 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 08:38:22 executing program 5 (fault-call:9 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2607.909837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2607.909844] Call Trace: [ 2607.909870] dump_stack+0x197/0x210 08:38:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd900000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2607.909902] should_fail.cold+0xa/0x1b [ 2607.909926] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2607.909947] ? lock_downgrade+0x880/0x880 [ 2607.909976] __should_failslab+0x121/0x190 [ 2607.909994] should_failslab+0x9/0x14 [ 2607.910010] kmem_cache_alloc_node+0x26c/0x710 08:38:23 executing program 5 (fault-call:9 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2607.910039] __alloc_skb+0xd5/0x5f0 [ 2607.910059] ? skb_trim+0x190/0x190 08:38:23 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2607.910077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2607.910095] ? netlink_autobind.isra.0+0x228/0x310 [ 2607.910125] netlink_sendmsg+0x97b/0xd70 [ 2607.910151] ? netlink_unicast+0x730/0x730 [ 2607.910175] ? selinux_socket_sendmsg+0x36/0x40 [ 2607.910190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2607.910206] ? security_socket_sendmsg+0x8d/0xc0 [ 2607.910226] ? netlink_unicast+0x730/0x730 [ 2607.910246] sock_sendmsg+0xd7/0x130 08:38:23 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xd901000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:23 executing program 5 (fault-call:9 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2607.910266] ___sys_sendmsg+0x803/0x920 [ 2607.910288] ? copy_msghdr_from_user+0x430/0x430 [ 2607.910312] ? lock_downgrade+0x880/0x880 [ 2607.910347] ? kasan_check_read+0x11/0x20 [ 2607.910370] ? __fget+0x367/0x540 [ 2607.910393] ? iterate_fd+0x360/0x360 [ 2607.910422] ? __fget_light+0x1a9/0x230 [ 2607.910441] ? __fdget+0x1b/0x20 [ 2607.910457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2607.910477] __sys_sendmsg+0x105/0x1d0 08:38:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x7f00000000000000], [], [], [], []]}, 0x585) 08:38:23 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2607.910494] ? __ia32_sys_shutdown+0x80/0x80 [ 2607.910526] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2607.910543] ? do_syscall_64+0x26/0x620 [ 2607.910558] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2607.910574] ? do_syscall_64+0x26/0x620 [ 2607.910594] __x64_sys_sendmsg+0x78/0xb0 [ 2607.910614] do_syscall_64+0xfd/0x620 [ 2607.910634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2607.910646] RIP: 0033:0x45af49 [ 2607.910663] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2607.910672] RSP: 002b:00007f75b3334c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2607.910687] RAX: ffffffffffffffda RBX: 00007f75b3334c90 RCX: 000000000045af49 [ 2607.910697] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2607.910706] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2607.910715] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33356d4 [ 2607.910724] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2607.935423] Dev loop1: unable to read RDB block 1 [ 2607.935457] loop1: unable to read partition table [ 2607.935527] loop1: partition table beyond EOD, truncated [ 2607.935545] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2608.178950] FAULT_INJECTION: forcing a failure. [ 2608.178950] name failslab, interval 1, probability 0, space 0, times 0 [ 2608.178968] CPU: 0 PID: 15489 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2608.178976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2608.178980] Call Trace: [ 2608.179000] dump_stack+0x197/0x210 [ 2608.179021] should_fail.cold+0xa/0x1b [ 2608.179041] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2608.179058] ? lock_downgrade+0x880/0x880 [ 2608.179080] __should_failslab+0x121/0x190 [ 2608.179096] should_failslab+0x9/0x14 [ 2608.179109] kmem_cache_alloc_node_trace+0x274/0x720 [ 2608.179125] ? __alloc_skb+0xd5/0x5f0 [ 2608.179146] __kmalloc_node_track_caller+0x3d/0x80 [ 2608.179166] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2608.179184] __alloc_skb+0x10b/0x5f0 [ 2608.179212] ? skb_trim+0x190/0x190 [ 2608.179231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.179248] ? netlink_autobind.isra.0+0x228/0x310 [ 2608.179271] netlink_sendmsg+0x97b/0xd70 [ 2608.179297] ? netlink_unicast+0x730/0x730 [ 2608.179317] ? selinux_socket_sendmsg+0x36/0x40 [ 2608.179331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.179343] ? security_socket_sendmsg+0x8d/0xc0 [ 2608.179360] ? netlink_unicast+0x730/0x730 [ 2608.179380] sock_sendmsg+0xd7/0x130 [ 2608.179396] ___sys_sendmsg+0x803/0x920 [ 2608.179414] ? copy_msghdr_from_user+0x430/0x430 [ 2608.179437] ? lock_downgrade+0x880/0x880 [ 2608.179453] ? kasan_check_read+0x11/0x20 [ 2608.179470] ? __fget+0x367/0x540 [ 2608.179487] ? iterate_fd+0x360/0x360 [ 2608.179503] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2608.179524] ? __fget_light+0x1a9/0x230 [ 2608.179539] ? __fdget+0x1b/0x20 [ 2608.179553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2608.179568] __sys_sendmsg+0x105/0x1d0 [ 2608.179582] ? __ia32_sys_shutdown+0x80/0x80 [ 2608.179595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2608.179612] ? syscall_trace_enter+0x40c/0xe40 [ 2608.179636] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2608.179651] ? do_syscall_64+0x26/0x620 [ 2608.179665] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2608.179680] ? do_syscall_64+0x26/0x620 [ 2608.179697] __x64_sys_sendmsg+0x78/0xb0 [ 2608.179714] do_syscall_64+0xfd/0x620 [ 2608.179732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2608.179750] RIP: 0033:0x45af49 [ 2608.179767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2608.179775] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2608.179790] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2608.179799] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2608.179807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2608.179815] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2608.179823] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2608.217009] Dev loop1: unable to read RDB block 1 [ 2608.217141] loop1: unable to read partition table [ 2608.217210] loop1: partition table beyond EOD, truncated [ 2608.217227] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2608.374267] FAULT_INJECTION: forcing a failure. [ 2608.374267] name failslab, interval 1, probability 0, space 0, times 0 [ 2608.374289] CPU: 0 PID: 15497 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2608.374299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2608.374304] Call Trace: [ 2608.374328] dump_stack+0x197/0x210 [ 2608.374352] should_fail.cold+0xa/0x1b [ 2608.374375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2608.374397] ? netlink_deliver_tap+0x146/0xc20 [ 2608.374418] __should_failslab+0x121/0x190 [ 2608.374436] should_failslab+0x9/0x14 [ 2608.374451] kmem_cache_alloc+0x47/0x700 [ 2608.374469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.374483] ? check_preemption_disabled+0x48/0x290 [ 2608.374498] ? lock_acquire+0x16f/0x3f0 [ 2608.374518] skb_clone+0x156/0x3e0 [ 2608.374539] netlink_deliver_tap+0x97b/0xc20 [ 2608.374577] netlink_unicast+0x5ae/0x730 [ 2608.374603] ? netlink_attachskb+0x770/0x770 [ 2608.374625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.374651] netlink_sendmsg+0x8ae/0xd70 [ 2608.374676] ? netlink_unicast+0x730/0x730 [ 2608.374699] ? selinux_socket_sendmsg+0x36/0x40 [ 2608.374714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.374728] ? security_socket_sendmsg+0x8d/0xc0 [ 2608.374745] ? netlink_unicast+0x730/0x730 [ 2608.374764] sock_sendmsg+0xd7/0x130 [ 2608.374783] ___sys_sendmsg+0x803/0x920 [ 2608.374805] ? copy_msghdr_from_user+0x430/0x430 [ 2608.374827] ? lock_downgrade+0x880/0x880 [ 2608.374846] ? kasan_check_read+0x11/0x20 [ 2608.374866] ? __fget+0x367/0x540 [ 2608.374886] ? iterate_fd+0x360/0x360 [ 2608.374906] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2608.374928] ? __fget_light+0x1a9/0x230 [ 2608.374946] ? __fdget+0x1b/0x20 [ 2608.374960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2608.374978] __sys_sendmsg+0x105/0x1d0 [ 2608.374993] ? __ia32_sys_shutdown+0x80/0x80 [ 2608.375008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2608.375026] ? syscall_trace_enter+0x40c/0xe40 [ 2608.375050] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2608.375067] ? do_syscall_64+0x26/0x620 [ 2608.375082] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2608.375097] ? do_syscall_64+0x26/0x620 [ 2608.375116] __x64_sys_sendmsg+0x78/0xb0 [ 2608.375134] do_syscall_64+0xfd/0x620 [ 2608.375153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2608.375166] RIP: 0033:0x45af49 [ 2608.375182] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2608.375190] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2608.375205] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2608.375214] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2608.375224] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2608.375234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2608.375243] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2608.450634] Dev loop1: unable to read RDB block 1 [ 2608.450663] loop1: unable to read partition table [ 2608.450853] loop1: partition table beyond EOD, truncated [ 2608.450869] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2608.677029] FAULT_INJECTION: forcing a failure. [ 2608.677029] name failslab, interval 1, probability 0, space 0, times 0 [ 2608.677051] CPU: 0 PID: 15745 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2608.677061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2608.677066] Call Trace: [ 2608.677097] dump_stack+0x197/0x210 [ 2608.677124] should_fail.cold+0xa/0x1b [ 2608.677147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2608.677167] ? lock_downgrade+0x880/0x880 [ 2608.677198] __should_failslab+0x121/0x190 [ 2608.677218] should_failslab+0x9/0x14 [ 2608.677233] kmem_cache_alloc_node+0x26c/0x710 [ 2608.677256] ? lock_downgrade+0x880/0x880 [ 2608.677290] __alloc_skb+0xd5/0x5f0 [ 2608.677311] ? skb_trim+0x190/0x190 [ 2608.677323] ? kfree+0x170/0x220 [ 2608.677340] ? __devinet_sysctl_unregister.isra.0+0x6b/0xb0 [ 2608.677353] ? kfree+0x170/0x220 [ 2608.677371] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2608.677396] inet_netconf_notify_devconf+0xea/0x250 [ 2608.677424] __devinet_sysctl_unregister.isra.0+0x85/0xb0 [ 2608.677444] devinet_sysctl_unregister+0x92/0xf0 [ 2608.677463] inetdev_event+0xa18/0x1240 [ 2608.677481] ? lock_downgrade+0x880/0x880 [ 2608.677502] ? inetdev_init+0x470/0x470 [ 2608.677521] ? up_read+0x1a/0x110 [ 2608.677545] notifier_call_chain+0xc2/0x230 [ 2608.677562] ? notifier_call_chain+0xc2/0x230 [ 2608.677587] raw_notifier_call_chain+0x2e/0x40 [ 2608.677654] call_netdevice_notifiers_info+0x3f/0x90 [ 2608.677675] dev_change_net_namespace+0x255/0xc60 [ 2608.677692] ? security_capable+0x92/0xc0 [ 2608.677713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.677732] ? dev_close+0x80/0x80 [ 2608.677751] ? __netlink_ns_capable+0x104/0x140 [ 2608.677773] ? netlink_ns_capable+0x26/0x30 [ 2608.677798] do_setlink+0x1ac/0x3670 [ 2608.677817] ? mark_held_locks+0x100/0x100 [ 2608.677840] ? rtnl_getlink+0x6b0/0x6b0 [ 2608.677857] ? __lock_acquire+0x6ee/0x49c0 [ 2608.677875] ? is_bpf_text_address+0xac/0x170 [ 2608.677896] ? __lock_acquire+0x6ee/0x49c0 [ 2608.677919] ? __lock_acquire+0x6ee/0x49c0 [ 2608.677933] ? mark_held_locks+0x100/0x100 [ 2608.677959] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2608.677973] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2608.677989] ? validate_nla+0x32f/0x810 [ 2608.678019] rtnl_newlink+0xbad/0x1600 [ 2608.678050] ? rtnl_link_unregister+0x250/0x250 [ 2608.678065] ? mark_held_locks+0x100/0x100 [ 2608.678091] ? is_bpf_text_address+0xac/0x170 [ 2608.678106] ? find_held_lock+0x35/0x130 [ 2608.678125] ? is_bpf_text_address+0xac/0x170 [ 2608.678145] ? __lock_acquire+0x6ee/0x49c0 [ 2608.678163] ? __lock_acquire+0x6ee/0x49c0 [ 2608.678179] ? lock_downgrade+0x880/0x880 [ 2608.678207] ? mark_held_locks+0x100/0x100 [ 2608.678225] ? mark_held_locks+0x100/0x100 [ 2608.678240] ? __kernel_text_address+0xd/0x40 [ 2608.678256] ? unwind_get_return_address+0x61/0xa0 [ 2608.678276] ? avc_has_perm_noaudit+0x38f/0x570 [ 2608.678297] ? __lock_acquire+0x6ee/0x49c0 [ 2608.678327] ? mark_held_locks+0x100/0x100 [ 2608.678346] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2608.678364] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2608.678381] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2608.678437] ? find_held_lock+0x35/0x130 [ 2608.678456] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2608.678474] ? find_held_lock+0xf0/0x130 [ 2608.678499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2608.678517] ? rtnl_link_unregister+0x250/0x250 [ 2608.678535] rtnetlink_rcv_msg+0x463/0xb00 [ 2608.678557] ? rtnetlink_put_metrics+0x560/0x560 [ 2608.678575] ? netdev_pick_tx+0x300/0x300 [ 2608.678605] ? netlink_deliver_tap+0x22d/0xc20 [ 2608.678624] ? find_held_lock+0x35/0x130 [ 2608.678648] netlink_rcv_skb+0x17d/0x460 [ 2608.678666] ? rtnetlink_put_metrics+0x560/0x560 [ 2608.678687] ? netlink_ack+0xb30/0xb30 [ 2608.678703] ? kasan_check_read+0x11/0x20 [ 2608.678724] ? netlink_deliver_tap+0x254/0xc20 [ 2608.678748] rtnetlink_rcv+0x1d/0x30 [ 2608.678765] netlink_unicast+0x53a/0x730 [ 2608.678788] ? netlink_attachskb+0x770/0x770 [ 2608.678808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.678829] netlink_sendmsg+0x8ae/0xd70 [ 2608.678854] ? netlink_unicast+0x730/0x730 [ 2608.678875] ? selinux_socket_sendmsg+0x36/0x40 [ 2608.678890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2608.678905] ? security_socket_sendmsg+0x8d/0xc0 [ 2608.678922] ? netlink_unicast+0x730/0x730 [ 2608.678945] sock_sendmsg+0xd7/0x130 [ 2608.678967] ___sys_sendmsg+0x803/0x920 [ 2608.678990] ? copy_msghdr_from_user+0x430/0x430 [ 2608.679013] ? lock_downgrade+0x880/0x880 [ 2608.679032] ? kasan_check_read+0x11/0x20 [ 2608.679053] ? __fget+0x367/0x540 [ 2608.679078] ? iterate_fd+0x360/0x360 [ 2608.679104] ? __fget_light+0x1a9/0x230 [ 2608.679122] ? __fdget+0x1b/0x20 [ 2608.679136] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2608.679155] __sys_sendmsg+0x105/0x1d0 [ 2608.679172] ? __ia32_sys_shutdown+0x80/0x80 [ 2608.679203] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2608.679220] ? do_syscall_64+0x26/0x620 [ 2608.679235] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2608.679251] ? do_syscall_64+0x26/0x620 [ 2608.679270] __x64_sys_sendmsg+0x78/0xb0 [ 2608.679289] do_syscall_64+0xfd/0x620 [ 2608.679309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2608.679321] RIP: 0033:0x45af49 [ 2608.679337] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2608.679347] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2608.679363] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2608.679372] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2608.679382] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:38:25 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]]}, 0x120) 08:38:25 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xda00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:25 executing program 5 (fault-call:9 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:25 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x9b00000000000000], [], [], [], []]}, 0x585) 08:38:25 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x207, 0x20) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0xff}, {0x7}], 0x2, 0x0) r3 = semget$private(0x0, 0x207, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000040)) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000340)={0xaed, 0xb0d, 0x7, 0xfffffff8}, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r6, 0x541c, &(0x7f0000000040)) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r7, 0x541c, &(0x7f0000000040)) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r8, 0x541c, &(0x7f0000000040)) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_FLINK(r9, 0xc008640a, &(0x7f0000000100)={0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000240)={r10, 0x40000, r12}) semtimedop(r3, &(0x7f0000000080)=[{0x0, 0x100}, {0x7}], 0x2, 0x0) semctl$IPC_INFO(r3, 0x2, 0x3, &(0x7f00000001c0)=""/123) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2080, 0x1) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="21c99393e5923ec095351e5bdb008ff56b2ab29d133c5f545c01febfb7e64086b9135393d2174b16f3c67d0e72ecf98939c3596d06e81126da01c74bfa77000028e9c7239ac192898870a52ce1fc1f18391f888335fea151cc6cf94bd37d203233831b26cbf67b9b6c411720e93177fc618a5e6a796807943def3dea44d26c5482d00623c3b820eb500acf950448a65e427adf467225d1fd97bcccc43edd4324718f81f44134ded300000100000000003900"/188], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2608.679391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2608.679400] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2608.820509] Dev loop1: unable to read RDB block 1 [ 2608.820539] loop1: unable to read partition table [ 2608.820606] loop1: partition table beyond EOD, truncated [ 2608.820623] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:25 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xda01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:25 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]]}, 0x120) 08:38:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000100)=@sr0='/dev/sr0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='udf\x00', 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) prctl$PR_SET_TIMERSLACK(0x1d, 0x7e01) dup3(r0, r2, 0x80000) 08:38:25 executing program 5 (fault-call:9 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2610.941376] FAULT_INJECTION: forcing a failure. [ 2610.941376] name failslab, interval 1, probability 0, space 0, times 0 08:38:26 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xdb00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2610.941396] CPU: 1 PID: 15965 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2610.941405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2610.941410] Call Trace: [ 2610.941431] dump_stack+0x197/0x210 08:38:26 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2610.941454] should_fail.cold+0xa/0x1b [ 2610.941476] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2610.941496] ? lock_downgrade+0x880/0x880 08:38:26 executing program 5 (fault-call:9 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2610.941519] __should_failslab+0x121/0x190 [ 2610.941536] should_failslab+0x9/0x14 [ 2610.941552] kmem_cache_alloc_node_trace+0x274/0x720 [ 2610.941572] ? __alloc_skb+0xd5/0x5f0 [ 2610.941596] __kmalloc_node_track_caller+0x3d/0x80 [ 2610.941618] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2610.941639] __alloc_skb+0x10b/0x5f0 08:38:26 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xdb01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2610.941658] ? skb_trim+0x190/0x190 [ 2610.941671] ? kfree+0x170/0x220 [ 2610.941687] ? __devinet_sysctl_unregister.isra.0+0x6b/0xb0 [ 2610.941701] ? kfree+0x170/0x220 [ 2610.941720] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2610.941743] inet_netconf_notify_devconf+0xea/0x250 [ 2610.941762] __devinet_sysctl_unregister.isra.0+0x85/0xb0 [ 2610.941780] devinet_sysctl_unregister+0x92/0xf0 [ 2610.941796] inetdev_event+0xa18/0x1240 [ 2610.941812] ? lock_downgrade+0x880/0x880 08:38:26 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xdc00000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2610.941830] ? inetdev_init+0x470/0x470 [ 2610.941850] ? up_read+0x1a/0x110 [ 2610.941873] notifier_call_chain+0xc2/0x230 [ 2610.941890] ? notifier_call_chain+0xc2/0x230 [ 2610.941916] raw_notifier_call_chain+0x2e/0x40 [ 2610.941937] call_netdevice_notifiers_info+0x3f/0x90 [ 2610.941955] dev_change_net_namespace+0x255/0xc60 [ 2610.941971] ? security_capable+0x92/0xc0 [ 2610.941991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2610.942008] ? dev_close+0x80/0x80 [ 2610.942026] ? __netlink_ns_capable+0x104/0x140 [ 2610.942044] ? netlink_ns_capable+0x26/0x30 [ 2610.942067] do_setlink+0x1ac/0x3670 [ 2610.942084] ? mark_held_locks+0x100/0x100 [ 2610.942107] ? rtnl_getlink+0x6b0/0x6b0 [ 2610.942124] ? __lock_acquire+0x6ee/0x49c0 [ 2610.942151] ? is_bpf_text_address+0xac/0x170 [ 2610.942173] ? __lock_acquire+0x6ee/0x49c0 [ 2610.942205] ? __lock_acquire+0x6ee/0x49c0 [ 2610.942222] ? mark_held_locks+0x100/0x100 [ 2610.942253] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2610.942268] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2610.942285] ? validate_nla+0x32f/0x810 [ 2610.942314] rtnl_newlink+0xbad/0x1600 [ 2610.942342] ? rtnl_link_unregister+0x250/0x250 [ 2610.942359] ? mark_held_locks+0x100/0x100 [ 2610.942387] ? is_bpf_text_address+0xac/0x170 [ 2610.942405] ? find_held_lock+0x35/0x130 [ 2610.942423] ? is_bpf_text_address+0xac/0x170 [ 2610.942442] ? __lock_acquire+0x6ee/0x49c0 [ 2610.942458] ? __lock_acquire+0x6ee/0x49c0 [ 2610.942473] ? lock_downgrade+0x880/0x880 [ 2610.942500] ? mark_held_locks+0x100/0x100 [ 2610.942517] ? mark_held_locks+0x100/0x100 [ 2610.942531] ? __kernel_text_address+0xd/0x40 [ 2610.942545] ? unwind_get_return_address+0x61/0xa0 [ 2610.942563] ? avc_has_perm_noaudit+0x38f/0x570 [ 2610.942584] ? __lock_acquire+0x6ee/0x49c0 [ 2610.942615] ? mark_held_locks+0x100/0x100 [ 2610.942631] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2610.942651] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2610.942668] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2610.942722] ? find_held_lock+0x35/0x130 [ 2610.942740] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2610.942758] ? find_held_lock+0xf0/0x130 [ 2610.942781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2610.942799] ? rtnl_link_unregister+0x250/0x250 [ 2610.942816] rtnetlink_rcv_msg+0x463/0xb00 [ 2610.942836] ? rtnetlink_put_metrics+0x560/0x560 [ 2610.942853] ? netdev_pick_tx+0x300/0x300 [ 2610.942870] ? netlink_deliver_tap+0x22d/0xc20 [ 2610.942886] ? find_held_lock+0x35/0x130 [ 2610.942908] netlink_rcv_skb+0x17d/0x460 [ 2610.942926] ? rtnetlink_put_metrics+0x560/0x560 [ 2610.942944] ? netlink_ack+0xb30/0xb30 [ 2610.942960] ? kasan_check_read+0x11/0x20 [ 2610.942980] ? netlink_deliver_tap+0x254/0xc20 [ 2610.943002] rtnetlink_rcv+0x1d/0x30 [ 2610.943018] netlink_unicast+0x53a/0x730 [ 2610.943039] ? netlink_attachskb+0x770/0x770 [ 2610.943057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2610.943077] netlink_sendmsg+0x8ae/0xd70 [ 2610.943101] ? netlink_unicast+0x730/0x730 [ 2610.943121] ? selinux_socket_sendmsg+0x36/0x40 [ 2610.943142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2610.943158] ? security_socket_sendmsg+0x8d/0xc0 [ 2610.943175] ? netlink_unicast+0x730/0x730 [ 2610.943195] sock_sendmsg+0xd7/0x130 [ 2610.943215] ___sys_sendmsg+0x803/0x920 [ 2610.943238] ? copy_msghdr_from_user+0x430/0x430 [ 2610.943260] ? lock_downgrade+0x880/0x880 [ 2610.943278] ? kasan_check_read+0x11/0x20 [ 2610.943297] ? __fget+0x367/0x540 [ 2610.943317] ? iterate_fd+0x360/0x360 [ 2610.943335] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2610.943359] ? __fget_light+0x1a9/0x230 [ 2610.943376] ? __fdget+0x1b/0x20 [ 2610.943390] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2610.943409] __sys_sendmsg+0x105/0x1d0 [ 2610.943423] ? __ia32_sys_shutdown+0x80/0x80 [ 2610.943438] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2610.943455] ? syscall_trace_enter+0x40c/0xe40 [ 2610.943481] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2610.943497] ? do_syscall_64+0x26/0x620 [ 2610.943513] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2610.943528] ? do_syscall_64+0x26/0x620 [ 2610.943550] __x64_sys_sendmsg+0x78/0xb0 [ 2610.943570] do_syscall_64+0xfd/0x620 [ 2610.943590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2610.943602] RIP: 0033:0x45af49 [ 2610.943618] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2610.943626] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2610.943642] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2610.943651] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2610.943661] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2610.943670] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2610.943680] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2610.965423] Dev loop1: unable to read RDB block 1 [ 2610.965454] loop1: unable to read partition table [ 2610.965523] loop1: partition table beyond EOD, truncated [ 2610.965540] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2611.305631] Dev loop1: unable to read RDB block 1 [ 2611.305666] loop1: unable to read partition table [ 2611.305730] loop1: partition table beyond EOD, truncated [ 2611.305765] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2611.368855] FAULT_INJECTION: forcing a failure. [ 2611.368855] name failslab, interval 1, probability 0, space 0, times 0 [ 2611.368877] CPU: 1 PID: 16307 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2611.368887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2611.368893] Call Trace: [ 2611.368916] dump_stack+0x197/0x210 [ 2611.368943] should_fail.cold+0xa/0x1b [ 2611.368966] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2611.368984] ? lock_downgrade+0x880/0x880 [ 2611.369012] __should_failslab+0x121/0x190 [ 2611.369029] should_failslab+0x9/0x14 [ 2611.369044] kmem_cache_alloc_node+0x26c/0x710 [ 2611.369072] __alloc_skb+0xd5/0x5f0 [ 2611.369091] ? skb_trim+0x190/0x190 [ 2611.369111] ? if_nlmsg_size+0x4ad/0x9f0 [ 2611.369135] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 2611.369159] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 2611.369183] rtmsg_ifinfo_newnet+0x9a/0xa4 [ 2611.369203] dev_change_net_namespace+0x3fb/0xc60 [ 2611.369217] ? security_capable+0x92/0xc0 [ 2611.369234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2611.369248] ? dev_close+0x80/0x80 [ 2611.369268] ? netlink_ns_capable+0x26/0x30 [ 2611.369291] do_setlink+0x1ac/0x3670 [ 2611.369311] ? mark_held_locks+0x100/0x100 [ 2611.369333] ? rtnl_getlink+0x6b0/0x6b0 [ 2611.369348] ? __lock_acquire+0x6ee/0x49c0 [ 2611.369363] ? is_bpf_text_address+0xac/0x170 [ 2611.369384] ? __lock_acquire+0x6ee/0x49c0 [ 2611.369408] ? __lock_acquire+0x6ee/0x49c0 [ 2611.369423] ? mark_held_locks+0x100/0x100 [ 2611.369447] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2611.369462] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2611.369477] ? validate_nla+0x32f/0x810 [ 2611.369506] rtnl_newlink+0xbad/0x1600 [ 2611.369545] ? rtnl_link_unregister+0x250/0x250 [ 2611.369562] ? mark_held_locks+0x100/0x100 [ 2611.369592] ? is_bpf_text_address+0xac/0x170 [ 2611.369611] ? find_held_lock+0x35/0x130 [ 2611.369629] ? is_bpf_text_address+0xac/0x170 [ 2611.369650] ? __lock_acquire+0x6ee/0x49c0 [ 2611.369668] ? __lock_acquire+0x6ee/0x49c0 [ 2611.369683] ? lock_downgrade+0x880/0x880 [ 2611.369708] ? mark_held_locks+0x100/0x100 [ 2611.369726] ? mark_held_locks+0x100/0x100 [ 2611.369742] ? __kernel_text_address+0xd/0x40 [ 2611.369757] ? unwind_get_return_address+0x61/0xa0 [ 2611.369782] ? avc_has_perm_noaudit+0x38f/0x570 [ 2611.369805] ? __lock_acquire+0x6ee/0x49c0 [ 2611.369840] ? mark_held_locks+0x100/0x100 [ 2611.369857] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2611.369878] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2611.369895] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2611.369953] ? find_held_lock+0x35/0x130 [ 2611.369972] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2611.369991] ? find_held_lock+0xf0/0x130 [ 2611.370016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2611.370034] ? rtnl_link_unregister+0x250/0x250 [ 2611.370053] rtnetlink_rcv_msg+0x463/0xb00 [ 2611.370074] ? rtnetlink_put_metrics+0x560/0x560 [ 2611.370092] ? netdev_pick_tx+0x300/0x300 [ 2611.370110] ? netlink_deliver_tap+0x22d/0xc20 [ 2611.370142] ? find_held_lock+0x35/0x130 [ 2611.370167] netlink_rcv_skb+0x17d/0x460 [ 2611.370187] ? rtnetlink_put_metrics+0x560/0x560 [ 2611.370209] ? netlink_ack+0xb30/0xb30 [ 2611.370225] ? kasan_check_read+0x11/0x20 [ 2611.370248] ? netlink_deliver_tap+0x254/0xc20 [ 2611.370271] rtnetlink_rcv+0x1d/0x30 [ 2611.370288] netlink_unicast+0x53a/0x730 [ 2611.370311] ? netlink_attachskb+0x770/0x770 [ 2611.370329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2611.370349] netlink_sendmsg+0x8ae/0xd70 [ 2611.370374] ? netlink_unicast+0x730/0x730 [ 2611.370395] ? selinux_socket_sendmsg+0x36/0x40 [ 2611.370410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2611.370424] ? security_socket_sendmsg+0x8d/0xc0 [ 2611.370441] ? netlink_unicast+0x730/0x730 [ 2611.370460] sock_sendmsg+0xd7/0x130 [ 2611.370480] ___sys_sendmsg+0x803/0x920 [ 2611.370502] ? copy_msghdr_from_user+0x430/0x430 [ 2611.370534] ? lock_downgrade+0x880/0x880 [ 2611.370554] ? kasan_check_read+0x11/0x20 [ 2611.370576] ? __fget+0x367/0x540 [ 2611.370597] ? iterate_fd+0x360/0x360 [ 2611.370618] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2611.370643] ? __fget_light+0x1a9/0x230 [ 2611.370660] ? __fdget+0x1b/0x20 [ 2611.370674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2611.370693] __sys_sendmsg+0x105/0x1d0 [ 2611.370709] ? __ia32_sys_shutdown+0x80/0x80 [ 2611.370726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2611.370743] ? syscall_trace_enter+0x40c/0xe40 [ 2611.370769] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2611.370786] ? do_syscall_64+0x26/0x620 [ 2611.370801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2611.370817] ? do_syscall_64+0x26/0x620 [ 2611.370837] __x64_sys_sendmsg+0x78/0xb0 [ 2611.370855] do_syscall_64+0xfd/0x620 [ 2611.370875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2611.370887] RIP: 0033:0x45af49 [ 2611.370903] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2611.370911] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2611.370926] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2611.370936] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2611.370945] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2611.370955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2611.370963] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2611.619693] Dev loop1: unable to read RDB block 1 [ 2611.619729] loop1: unable to read partition table [ 2611.619795] loop1: partition table beyond EOD, truncated [ 2611.619810] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2611.709151] FAULT_INJECTION: forcing a failure. [ 2611.709151] name failslab, interval 1, probability 0, space 0, times 0 [ 2611.709202] CPU: 0 PID: 16532 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2611.709213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2611.709219] Call Trace: [ 2611.709242] dump_stack+0x197/0x210 [ 2611.709270] should_fail.cold+0xa/0x1b [ 2611.709294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2611.709314] ? lock_downgrade+0x880/0x880 [ 2611.709342] __should_failslab+0x121/0x190 [ 2611.709359] should_failslab+0x9/0x14 [ 2611.709375] kmem_cache_alloc_node_trace+0x274/0x720 [ 2611.709402] ? __alloc_skb+0xd5/0x5f0 [ 2611.709427] __kmalloc_node_track_caller+0x3d/0x80 [ 2611.709449] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2611.709470] __alloc_skb+0x10b/0x5f0 [ 2611.709488] ? skb_trim+0x190/0x190 [ 2611.709509] ? if_nlmsg_size+0x4ad/0x9f0 [ 2611.709533] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 2611.709558] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 2611.709582] rtmsg_ifinfo_newnet+0x9a/0xa4 [ 2611.709603] dev_change_net_namespace+0x3fb/0xc60 [ 2611.709619] ? security_capable+0x92/0xc0 [ 2611.709639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2611.709656] ? dev_close+0x80/0x80 [ 2611.709680] ? netlink_ns_capable+0x26/0x30 [ 2611.709703] do_setlink+0x1ac/0x3670 [ 2611.709723] ? mark_held_locks+0x100/0x100 [ 2611.709748] ? rtnl_getlink+0x6b0/0x6b0 [ 2611.709767] ? __lock_acquire+0x6ee/0x49c0 [ 2611.709784] ? is_bpf_text_address+0xac/0x170 [ 2611.709806] ? __lock_acquire+0x6ee/0x49c0 [ 2611.709831] ? __lock_acquire+0x6ee/0x49c0 [ 2611.709846] ? mark_held_locks+0x100/0x100 [ 2611.709871] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2611.709885] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2611.709902] ? validate_nla+0x32f/0x810 [ 2611.709932] rtnl_newlink+0xbad/0x1600 [ 2611.709961] ? rtnl_link_unregister+0x250/0x250 [ 2611.709977] ? mark_held_locks+0x100/0x100 [ 2611.710004] ? __lock_acquire+0x6ee/0x49c0 [ 2611.710021] ? is_bpf_text_address+0xac/0x170 [ 2611.710042] ? __lock_acquire+0x6ee/0x49c0 [ 2611.710058] ? is_bpf_text_address+0xac/0x170 [ 2611.710077] ? __lock_acquire+0x6ee/0x49c0 [ 2611.710095] ? __lock_acquire+0x6ee/0x49c0 [ 2611.710142] ? mark_held_locks+0x100/0x100 [ 2611.710162] ? mark_held_locks+0x100/0x100 [ 2611.710186] ? __lock_acquire+0x6ee/0x49c0 [ 2611.710204] ? avc_has_perm_noaudit+0x38f/0x570 [ 2611.710228] ? __lock_acquire+0x6ee/0x49c0 [ 2611.710263] ? mark_held_locks+0x100/0x100 [ 2611.710281] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2611.710302] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2611.710320] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2611.710388] ? find_held_lock+0x35/0x130 [ 2611.710408] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2611.710429] ? find_held_lock+0xf0/0x130 [ 2611.710457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2611.710476] ? rtnl_link_unregister+0x250/0x250 [ 2611.710493] rtnetlink_rcv_msg+0x463/0xb00 [ 2611.710512] ? rtnetlink_put_metrics+0x560/0x560 [ 2611.710528] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2611.710540] ? rcu_read_unlock_special+0x679/0xea0 [ 2611.710558] ? netlink_deliver_tap+0x22d/0xc20 [ 2611.710576] ? find_held_lock+0x35/0x130 [ 2611.710599] netlink_rcv_skb+0x17d/0x460 [ 2611.710617] ? rtnetlink_put_metrics+0x560/0x560 [ 2611.710634] ? netlink_ack+0xb30/0xb30 [ 2611.710655] ? netlink_deliver_tap+0x254/0xc20 [ 2611.710680] rtnetlink_rcv+0x1d/0x30 [ 2611.710696] netlink_unicast+0x53a/0x730 [ 2611.710716] ? netlink_attachskb+0x770/0x770 [ 2611.710733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2611.710753] netlink_sendmsg+0x8ae/0xd70 [ 2611.710777] ? netlink_unicast+0x730/0x730 [ 2611.710796] ? selinux_socket_sendmsg+0x36/0x40 [ 2611.710810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2611.710825] ? security_socket_sendmsg+0x8d/0xc0 [ 2611.710842] ? netlink_unicast+0x730/0x730 [ 2611.710860] sock_sendmsg+0xd7/0x130 [ 2611.710879] ___sys_sendmsg+0x803/0x920 [ 2611.710898] ? copy_msghdr_from_user+0x430/0x430 [ 2611.710918] ? lock_downgrade+0x880/0x880 [ 2611.710937] ? kasan_check_read+0x11/0x20 [ 2611.710956] ? __fget+0x367/0x540 [ 2611.710979] ? iterate_fd+0x360/0x360 [ 2611.711000] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2611.711024] ? __fget_light+0x1a9/0x230 [ 2611.711040] ? __fdget+0x1b/0x20 [ 2611.711054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2611.711073] __sys_sendmsg+0x105/0x1d0 [ 2611.711089] ? __ia32_sys_shutdown+0x80/0x80 [ 2611.711104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2611.711122] ? syscall_trace_enter+0x40c/0xe40 [ 2611.711145] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2611.711162] ? do_syscall_64+0x26/0x620 [ 2611.711177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2611.711192] ? do_syscall_64+0x26/0x620 [ 2611.711212] __x64_sys_sendmsg+0x78/0xb0 [ 2611.711230] do_syscall_64+0xfd/0x620 [ 2611.711250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2611.711263] RIP: 0033:0x45af49 [ 2611.711278] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2611.711287] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2611.711303] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2611.711313] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2611.711321] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2611.711330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 08:38:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x0, 0x2], [], [], [], []]}, 0x585) 08:38:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:28 executing program 5 (fault-call:9 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:28 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xdc01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:28 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]]}, 0x120) [ 2611.711339] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 08:38:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f00000000c0)=0xffff, 0x4) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:28 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]]}, 0x120) 08:38:28 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xdd00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:28 executing program 5 (fault-call:9 fault-nth:8): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000100)={0x990000, 0xff, 0x800, r3, 0x0, &(0x7f00000000c0)={0x0, 0x3, [], @p_u16=&(0x7f0000000080)}}) write$P9_RWRITE(r4, &(0x7f00000001c0)={0xb, 0x77, 0x2, 0x9}, 0xb) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2614.002351] FAULT_INJECTION: forcing a failure. [ 2614.002351] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.002374] CPU: 1 PID: 16870 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2614.002384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.002390] Call Trace: [ 2614.002413] dump_stack+0x197/0x210 [ 2614.002438] should_fail.cold+0xa/0x1b [ 2614.002461] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2614.002481] ? lock_downgrade+0x880/0x880 [ 2614.002509] __should_failslab+0x121/0x190 [ 2614.002527] should_failslab+0x9/0x14 [ 2614.002542] kmem_cache_alloc_trace+0x2cc/0x760 [ 2614.002560] ? mark_held_locks+0xb1/0x100 [ 2614.002579] ? __local_bh_enable_ip+0x15a/0x270 [ 2614.002596] ? dev_uevent_filter+0xe0/0xe0 [ 2614.002614] kobject_uevent_env+0x22c/0x1170 [ 2614.002629] ? trace_hardirqs_on+0x67/0x220 [ 2614.002644] ? dev_mc_flush+0x32/0x40 [ 2614.002670] kobject_uevent+0x20/0x30 [ 2614.002687] dev_change_net_namespace+0x427/0xc60 [ 2614.002703] ? security_capable+0x92/0xc0 [ 2614.002722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.002740] ? dev_close+0x80/0x80 [ 2614.002763] ? netlink_ns_capable+0x26/0x30 [ 2614.002785] do_setlink+0x1ac/0x3670 [ 2614.002813] ? rtnl_getlink+0x6b0/0x6b0 [ 2614.002832] ? __lock_acquire+0x6ee/0x49c0 [ 2614.002853] ? mark_held_locks+0xb1/0x100 [ 2614.002869] ? _raw_spin_unlock_irq+0x28/0x90 [ 2614.002885] ? finish_task_switch+0x146/0x7c0 [ 2614.002909] ? __lock_acquire+0x6ee/0x49c0 [ 2614.002925] ? mark_held_locks+0x100/0x100 [ 2614.002941] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2614.002958] ? finish_task_switch+0x146/0x7c0 [ 2614.002973] ? finish_task_switch+0x118/0x7c0 [ 2614.002987] ? switch_mm_irqs_off+0x7fa/0x1360 [ 2614.003004] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2614.003020] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2614.003036] ? validate_nla+0x32f/0x810 [ 2614.003066] rtnl_newlink+0xbad/0x1600 [ 2614.003096] ? rtnl_link_unregister+0x250/0x250 [ 2614.003111] ? mark_held_locks+0x100/0x100 [ 2614.003140] ? is_bpf_text_address+0xac/0x170 [ 2614.003157] ? find_held_lock+0x35/0x130 [ 2614.003175] ? is_bpf_text_address+0xac/0x170 [ 2614.003195] ? __lock_acquire+0x6ee/0x49c0 [ 2614.003213] ? __lock_acquire+0x6ee/0x49c0 [ 2614.003229] ? lock_downgrade+0x880/0x880 [ 2614.003257] ? mark_held_locks+0x100/0x100 [ 2614.003288] ? mark_held_locks+0x100/0x100 [ 2614.003306] ? __kernel_text_address+0xd/0x40 [ 2614.003321] ? unwind_get_return_address+0x61/0xa0 [ 2614.003341] ? avc_has_perm_noaudit+0x38f/0x570 [ 2614.003362] ? __lock_acquire+0x6ee/0x49c0 [ 2614.003394] ? mark_held_locks+0x100/0x100 [ 2614.003412] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2614.003433] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2614.003450] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2614.003509] ? find_held_lock+0x35/0x130 [ 2614.003528] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2614.003548] ? find_held_lock+0xf0/0x130 [ 2614.003573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2614.003593] ? rtnl_link_unregister+0x250/0x250 [ 2614.003612] rtnetlink_rcv_msg+0x463/0xb00 [ 2614.003634] ? rtnetlink_put_metrics+0x560/0x560 [ 2614.003651] ? netdev_pick_tx+0x300/0x300 [ 2614.003671] ? netlink_deliver_tap+0x22d/0xc20 [ 2614.003688] ? find_held_lock+0x35/0x130 [ 2614.003712] netlink_rcv_skb+0x17d/0x460 [ 2614.003731] ? rtnetlink_put_metrics+0x560/0x560 [ 2614.003751] ? netlink_ack+0xb30/0xb30 [ 2614.003768] ? kasan_check_read+0x11/0x20 [ 2614.003790] ? netlink_deliver_tap+0x254/0xc20 [ 2614.003814] rtnetlink_rcv+0x1d/0x30 [ 2614.003831] netlink_unicast+0x53a/0x730 [ 2614.003854] ? netlink_attachskb+0x770/0x770 [ 2614.003873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.003896] netlink_sendmsg+0x8ae/0xd70 [ 2614.003922] ? netlink_unicast+0x730/0x730 [ 2614.003945] ? selinux_socket_sendmsg+0x36/0x40 [ 2614.003959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.003974] ? security_socket_sendmsg+0x8d/0xc0 [ 2614.003991] ? netlink_unicast+0x730/0x730 [ 2614.004010] sock_sendmsg+0xd7/0x130 [ 2614.004029] ___sys_sendmsg+0x803/0x920 [ 2614.004051] ? copy_msghdr_from_user+0x430/0x430 [ 2614.004073] ? lock_downgrade+0x880/0x880 [ 2614.004093] ? kasan_check_read+0x11/0x20 [ 2614.004113] ? __fget+0x367/0x540 [ 2614.004134] ? iterate_fd+0x360/0x360 [ 2614.004147] ? retint_kernel+0x2d/0x2d [ 2614.004163] ? check_preemption_disabled+0x48/0x290 [ 2614.004186] ? __fget_light+0x1a9/0x230 [ 2614.004203] ? __fdget+0x1b/0x20 [ 2614.004217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2614.004236] __sys_sendmsg+0x105/0x1d0 [ 2614.004250] ? __ia32_sys_shutdown+0x80/0x80 [ 2614.004273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2614.004294] ? syscall_trace_enter+0x40c/0xe40 [ 2614.004320] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2614.004336] ? do_syscall_64+0x26/0x620 [ 2614.004350] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.004364] ? do_syscall_64+0x26/0x620 [ 2614.004384] __x64_sys_sendmsg+0x78/0xb0 [ 2614.004403] do_syscall_64+0xfd/0x620 [ 2614.004423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.004435] RIP: 0033:0x45af49 [ 2614.004453] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2614.004463] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2614.004478] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2614.004487] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2614.004496] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2614.004504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2614.004513] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2614.006489] Dev loop1: unable to read RDB block 1 [ 2614.006519] loop1: unable to read partition table [ 2614.006582] loop1: partition table beyond EOD, truncated [ 2614.006598] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2614.025570] nbd_handle_cmd: 50 callbacks suppressed [ 2614.025585] block nbd0: Attempted send on invalid socket [ 2614.025607] print_req_error: 50 callbacks suppressed [ 2614.025615] print_req_error: I/O error, dev nbd0, sector 64 [ 2614.026194] block nbd0: Attempted send on invalid socket [ 2614.026210] print_req_error: I/O error, dev nbd0, sector 256 [ 2614.026412] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2614.026673] block nbd0: Attempted send on invalid socket [ 2614.026689] print_req_error: I/O error, dev nbd0, sector 512 [ 2614.026943] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2614.026954] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2614.026961] UDF-fs: Scanning with blocksize 512 failed [ 2614.027462] block nbd0: Attempted send on invalid socket [ 2614.027477] print_req_error: I/O error, dev nbd0, sector 64 [ 2614.027883] block nbd0: Attempted send on invalid socket [ 2614.027899] print_req_error: I/O error, dev nbd0, sector 512 [ 2614.028254] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2614.028438] block nbd0: Attempted send on invalid socket [ 2614.029095] print_req_error: I/O error, dev nbd0, sector 1024 [ 2614.030150] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2614.030163] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2614.030172] UDF-fs: Scanning with blocksize 1024 failed [ 2614.030551] block nbd0: Attempted send on invalid socket [ 2614.030566] print_req_error: I/O error, dev nbd0, sector 64 [ 2614.030989] block nbd0: Attempted send on invalid socket [ 2614.031004] print_req_error: I/O error, dev nbd0, sector 1024 [ 2614.031317] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2614.031502] block nbd0: Attempted send on invalid socket [ 2614.031518] print_req_error: I/O error, dev nbd0, sector 2048 [ 2614.033373] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2614.033385] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2614.033394] UDF-fs: Scanning with blocksize 2048 failed [ 2614.033673] block nbd0: Attempted send on invalid socket [ 2614.033689] print_req_error: I/O error, dev nbd0, sector 64 [ 2614.034689] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2614.034853] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2614.034864] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2614.034872] UDF-fs: Scanning with blocksize 4096 failed [ 2614.034882] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2614.330709] Dev loop1: unable to read RDB block 1 [ 2614.330739] loop1: unable to read partition table [ 2614.330798] loop1: partition table beyond EOD, truncated [ 2614.330814] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2614.383069] FAULT_INJECTION: forcing a failure. [ 2614.383069] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.383091] CPU: 1 PID: 17150 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2614.383101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.383106] Call Trace: [ 2614.383130] dump_stack+0x197/0x210 [ 2614.383154] should_fail.cold+0xa/0x1b [ 2614.383178] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2614.383197] ? lock_downgrade+0x880/0x880 [ 2614.383223] __should_failslab+0x121/0x190 [ 2614.383239] should_failslab+0x9/0x14 [ 2614.383253] __kmalloc+0x2e2/0x750 [ 2614.383273] ? rcu_read_lock_sched_held+0x110/0x130 [ 2614.383289] ? kobject_get_path+0xc2/0x1a0 [ 2614.383306] kobject_get_path+0xc2/0x1a0 [ 2614.383326] kobject_uevent_env+0x251/0x1170 [ 2614.383339] ? trace_hardirqs_on+0x67/0x220 [ 2614.383353] ? dev_mc_flush+0x32/0x40 [ 2614.383378] kobject_uevent+0x20/0x30 [ 2614.383397] dev_change_net_namespace+0x427/0xc60 [ 2614.383413] ? security_capable+0x92/0xc0 [ 2614.383433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.383450] ? dev_close+0x80/0x80 [ 2614.383472] ? netlink_ns_capable+0x26/0x30 [ 2614.383496] do_setlink+0x1ac/0x3670 [ 2614.383525] ? rtnl_getlink+0x6b0/0x6b0 [ 2614.383541] ? __lock_acquire+0x6ee/0x49c0 [ 2614.383563] ? __lock_acquire+0x6ee/0x49c0 [ 2614.383585] ? __lock_acquire+0x6ee/0x49c0 [ 2614.383600] ? mark_held_locks+0x100/0x100 [ 2614.383625] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2614.383642] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2614.383657] ? validate_nla+0x32f/0x810 [ 2614.383685] rtnl_newlink+0xbad/0x1600 [ 2614.383726] ? rtnl_link_unregister+0x250/0x250 [ 2614.383743] ? mark_held_locks+0x100/0x100 [ 2614.383767] ? is_bpf_text_address+0xac/0x170 [ 2614.383781] ? find_held_lock+0x35/0x130 [ 2614.383801] ? is_bpf_text_address+0xac/0x170 [ 2614.383823] ? __lock_acquire+0x6ee/0x49c0 [ 2614.383841] ? __lock_acquire+0x6ee/0x49c0 [ 2614.383856] ? lock_downgrade+0x880/0x880 [ 2614.383883] ? mark_held_locks+0x100/0x100 [ 2614.383900] ? mark_held_locks+0x100/0x100 [ 2614.383916] ? __kernel_text_address+0xd/0x40 [ 2614.383930] ? unwind_get_return_address+0x61/0xa0 [ 2614.383949] ? avc_has_perm_noaudit+0x38f/0x570 [ 2614.383970] ? __lock_acquire+0x6ee/0x49c0 [ 2614.384003] ? mark_held_locks+0x100/0x100 [ 2614.384021] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2614.384041] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2614.384057] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2614.384115] ? find_held_lock+0x35/0x130 [ 2614.384133] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2614.384153] ? find_held_lock+0xf0/0x130 [ 2614.384178] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2614.384195] ? rtnl_link_unregister+0x250/0x250 [ 2614.384212] rtnetlink_rcv_msg+0x463/0xb00 [ 2614.384234] ? rtnetlink_put_metrics+0x560/0x560 [ 2614.384252] ? netdev_pick_tx+0x300/0x300 [ 2614.384271] ? netlink_deliver_tap+0x22d/0xc20 [ 2614.384288] ? find_held_lock+0x35/0x130 [ 2614.384312] netlink_rcv_skb+0x17d/0x460 [ 2614.384331] ? rtnetlink_put_metrics+0x560/0x560 [ 2614.384349] ? netlink_ack+0xb30/0xb30 [ 2614.384365] ? kasan_check_read+0x11/0x20 [ 2614.384386] ? netlink_deliver_tap+0x254/0xc20 [ 2614.384410] rtnetlink_rcv+0x1d/0x30 [ 2614.384427] netlink_unicast+0x53a/0x730 [ 2614.384448] ? netlink_attachskb+0x770/0x770 [ 2614.384468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.384489] netlink_sendmsg+0x8ae/0xd70 [ 2614.384511] ? netlink_unicast+0x730/0x730 [ 2614.384533] ? selinux_socket_sendmsg+0x36/0x40 [ 2614.384547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.384562] ? security_socket_sendmsg+0x8d/0xc0 [ 2614.384579] ? netlink_unicast+0x730/0x730 [ 2614.384600] sock_sendmsg+0xd7/0x130 [ 2614.384620] ___sys_sendmsg+0x803/0x920 [ 2614.384640] ? copy_msghdr_from_user+0x430/0x430 [ 2614.384663] ? lock_downgrade+0x880/0x880 [ 2614.384681] ? kasan_check_read+0x11/0x20 [ 2614.384710] ? __fget+0x367/0x540 [ 2614.384732] ? iterate_fd+0x360/0x360 [ 2614.384753] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2614.384776] ? __fget_light+0x1a9/0x230 [ 2614.384794] ? __fdget+0x1b/0x20 [ 2614.384809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2614.384826] __sys_sendmsg+0x105/0x1d0 [ 2614.384840] ? __ia32_sys_shutdown+0x80/0x80 [ 2614.384854] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2614.384871] ? syscall_trace_enter+0x40c/0xe40 [ 2614.384893] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2614.384908] ? do_syscall_64+0x26/0x620 [ 2614.384923] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.384937] ? do_syscall_64+0x26/0x620 [ 2614.384957] __x64_sys_sendmsg+0x78/0xb0 [ 2614.384974] do_syscall_64+0xfd/0x620 [ 2614.384994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.385006] RIP: 0033:0x45af49 [ 2614.385022] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2614.385031] RSP: 002b:00007f75b3334c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2614.385046] RAX: ffffffffffffffda RBX: 00007f75b3334c90 RCX: 000000000045af49 [ 2614.385055] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2614.385063] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2614.385071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33356d4 [ 2614.385080] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2614.579948] Dev loop1: unable to read RDB block 1 08:38:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x0, 0x7], [], [], [], []]}, 0x585) 08:38:31 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xdd01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:31 executing program 5 (fault-call:9 fault-nth:9): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:31 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]]}, 0x120) [ 2614.580018] loop1: unable to read partition table [ 2614.580151] loop1: partition table beyond EOD, truncated [ 2614.580168] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="cfcb5aa9867e147f00684add33be13ce8ccd7d8d921ec9d82bce94f422152c137e4ac7f005d31c808a13e5ccc386e2eb2055a2a7be9c7f2696fbe458fac4fcf8a290a71aca49526847a5c2f62a654708dcaebe2fc389881cf8ac52042799a6a6662ee1e08aec5284dca89776cd3520825ec99ff427290a02406fa21331ea442b2cc74d507d6f2e476a5a260eb91d2485b297362e8f1104e3668ecd8d791f786f8a2f8fae43e1808b5eb235594241515094", 0xb1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:31 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]]}, 0x120) 08:38:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:31 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xde00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:31 executing program 5 (fault-call:9 fault-nth:10): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2616.349691] Dev loop1: unable to read RDB block 1 08:38:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x20, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="0f6465762f6e62643000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2616.349721] loop1: unable to read partition table [ 2616.349783] loop1: partition table beyond EOD, truncated 08:38:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2616.349800] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2616.390150] FAULT_INJECTION: forcing a failure. [ 2616.390150] name failslab, interval 1, probability 0, space 0, times 0 [ 2616.390222] CPU: 1 PID: 17444 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2616.390231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.390236] Call Trace: [ 2616.390258] dump_stack+0x197/0x210 [ 2616.390282] should_fail.cold+0xa/0x1b [ 2616.390303] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2616.390322] ? lock_downgrade+0x880/0x880 [ 2616.390349] __should_failslab+0x121/0x190 [ 2616.390365] should_failslab+0x9/0x14 [ 2616.390378] kmem_cache_alloc_node+0x26c/0x710 [ 2616.390404] __alloc_skb+0xd5/0x5f0 [ 2616.390421] ? skb_trim+0x190/0x190 [ 2616.390440] ? rcu_read_lock_sched_held+0x110/0x130 [ 2616.390462] alloc_uevent_skb+0x86/0x220 [ 2616.390479] ? dev_attr_store+0x80/0x80 [ 2616.390498] kobject_uevent_env+0xe5d/0x1170 [ 2616.390512] ? trace_hardirqs_on+0x67/0x220 [ 2616.390537] kobject_uevent+0x20/0x30 [ 2616.390562] dev_change_net_namespace+0x427/0xc60 [ 2616.390579] ? security_capable+0x92/0xc0 [ 2616.390599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.390617] ? dev_close+0x80/0x80 [ 2616.390639] ? netlink_ns_capable+0x26/0x30 [ 2616.390661] do_setlink+0x1ac/0x3670 [ 2616.390679] ? mark_held_locks+0x100/0x100 [ 2616.390832] ? rtnl_getlink+0x6b0/0x6b0 [ 2616.390856] ? __lock_acquire+0x6ee/0x49c0 [ 2616.390873] ? is_bpf_text_address+0xac/0x170 [ 2616.390896] ? __lock_acquire+0x6ee/0x49c0 [ 2616.390919] ? __lock_acquire+0x6ee/0x49c0 [ 2616.390933] ? mark_held_locks+0x100/0x100 [ 2616.390958] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2616.390974] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2616.390990] ? validate_nla+0x32f/0x810 [ 2616.391018] rtnl_newlink+0xbad/0x1600 [ 2616.391047] ? rtnl_link_unregister+0x250/0x250 [ 2616.391062] ? mark_held_locks+0x100/0x100 [ 2616.391088] ? is_bpf_text_address+0xac/0x170 [ 2616.391105] ? find_held_lock+0x35/0x130 [ 2616.391122] ? is_bpf_text_address+0xac/0x170 [ 2616.391141] ? __lock_acquire+0x6ee/0x49c0 [ 2616.391158] ? __lock_acquire+0x6ee/0x49c0 [ 2616.391174] ? lock_downgrade+0x880/0x880 [ 2616.391200] ? mark_held_locks+0x100/0x100 [ 2616.391217] ? mark_held_locks+0x100/0x100 [ 2616.391232] ? __kernel_text_address+0xd/0x40 [ 2616.391247] ? unwind_get_return_address+0x61/0xa0 [ 2616.391265] ? avc_has_perm_noaudit+0x38f/0x570 [ 2616.391285] ? __lock_acquire+0x6ee/0x49c0 [ 2616.391316] ? mark_held_locks+0x100/0x100 [ 2616.391334] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2616.391354] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2616.391370] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2616.391425] ? find_held_lock+0x35/0x130 [ 2616.391443] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2616.391462] ? find_held_lock+0xf0/0x130 [ 2616.391486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2616.391504] ? rtnl_link_unregister+0x250/0x250 [ 2616.391522] rtnetlink_rcv_msg+0x463/0xb00 [ 2616.391542] ? rtnetlink_put_metrics+0x560/0x560 [ 2616.391559] ? netdev_pick_tx+0x300/0x300 [ 2616.391587] ? netlink_deliver_tap+0x22d/0xc20 [ 2616.391605] ? find_held_lock+0x35/0x130 [ 2616.391628] netlink_rcv_skb+0x17d/0x460 [ 2616.391648] ? rtnetlink_put_metrics+0x560/0x560 [ 2616.391668] ? netlink_ack+0xb30/0xb30 [ 2616.391685] ? kasan_check_read+0x11/0x20 [ 2616.391706] ? netlink_deliver_tap+0x254/0xc20 [ 2616.391729] rtnetlink_rcv+0x1d/0x30 [ 2616.391748] netlink_unicast+0x53a/0x730 [ 2616.391770] ? netlink_attachskb+0x770/0x770 [ 2616.391788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.391809] netlink_sendmsg+0x8ae/0xd70 [ 2616.391833] ? netlink_unicast+0x730/0x730 [ 2616.391853] ? selinux_socket_sendmsg+0x36/0x40 [ 2616.391866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.391880] ? security_socket_sendmsg+0x8d/0xc0 [ 2616.391896] ? netlink_unicast+0x730/0x730 [ 2616.391915] sock_sendmsg+0xd7/0x130 [ 2616.391934] ___sys_sendmsg+0x803/0x920 [ 2616.391955] ? copy_msghdr_from_user+0x430/0x430 [ 2616.391978] ? lock_downgrade+0x880/0x880 [ 2616.391996] ? kasan_check_read+0x11/0x20 [ 2616.392018] ? __fget+0x367/0x540 [ 2616.392040] ? iterate_fd+0x360/0x360 [ 2616.392056] ? check_preemption_disabled+0x48/0x290 [ 2616.392079] ? __fget_light+0x1a9/0x230 [ 2616.392096] ? __fdget+0x1b/0x20 [ 2616.392112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2616.392133] __sys_sendmsg+0x105/0x1d0 [ 2616.392149] ? __ia32_sys_shutdown+0x80/0x80 [ 2616.392166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2616.392185] ? syscall_trace_enter+0x40c/0xe40 [ 2616.392211] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2616.392227] ? do_syscall_64+0x26/0x620 [ 2616.392242] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.392257] ? do_syscall_64+0x26/0x620 [ 2616.392277] __x64_sys_sendmsg+0x78/0xb0 [ 2616.392295] do_syscall_64+0xfd/0x620 [ 2616.392314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.392326] RIP: 0033:0x45af49 [ 2616.392342] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2616.392350] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2616.392363] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2616.392372] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2616.392381] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2616.392390] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2616.392398] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2616.439994] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2616.440384] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2616.440397] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2616.440404] UDF-fs: Scanning with blocksize 512 failed [ 2616.449541] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2616.452722] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2616.452737] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2616.452746] UDF-fs: Scanning with blocksize 1024 failed [ 2616.453342] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2616.453521] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2616.453532] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2616.453539] UDF-fs: Scanning with blocksize 2048 failed [ 2616.463217] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2616.463436] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2616.463448] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2616.463457] UDF-fs: Scanning with blocksize 4096 failed [ 2616.463467] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2616.640302] Dev loop1: unable to read RDB block 1 [ 2616.640339] loop1: unable to read partition table [ 2616.640468] loop1: partition table beyond EOD, truncated [ 2616.640485] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2616.719213] FAULT_INJECTION: forcing a failure. [ 2616.719213] name failslab, interval 1, probability 0, space 0, times 0 [ 2616.719234] CPU: 1 PID: 17665 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2616.719245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.719251] Call Trace: [ 2616.719274] dump_stack+0x197/0x210 [ 2616.719300] should_fail.cold+0xa/0x1b [ 2616.719322] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2616.719340] ? lock_downgrade+0x880/0x880 [ 2616.719366] __should_failslab+0x121/0x190 [ 2616.719383] should_failslab+0x9/0x14 [ 2616.719398] kmem_cache_alloc_node+0x26c/0x710 [ 2616.719428] __alloc_skb+0xd5/0x5f0 [ 2616.719447] ? skb_trim+0x190/0x190 [ 2616.719467] ? rcu_read_lock_sched_held+0x110/0x130 [ 2616.719492] alloc_uevent_skb+0x86/0x220 [ 2616.719511] ? dev_attr_store+0x80/0x80 [ 2616.719531] kobject_uevent_env+0xe5d/0x1170 [ 2616.719545] ? trace_hardirqs_on+0x67/0x220 [ 2616.719582] kobject_uevent+0x20/0x30 [ 2616.719601] dev_change_net_namespace+0x427/0xc60 [ 2616.719618] ? security_capable+0x92/0xc0 [ 2616.719639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.719658] ? dev_close+0x80/0x80 [ 2616.719682] ? netlink_ns_capable+0x26/0x30 [ 2616.719705] do_setlink+0x1ac/0x3670 [ 2616.719729] ? mark_held_locks+0x100/0x100 [ 2616.719751] ? rtnl_getlink+0x6b0/0x6b0 [ 2616.719768] ? __lock_acquire+0x6ee/0x49c0 [ 2616.719786] ? is_bpf_text_address+0xac/0x170 [ 2616.719808] ? __lock_acquire+0x6ee/0x49c0 [ 2616.719833] ? __lock_acquire+0x6ee/0x49c0 [ 2616.719848] ? mark_held_locks+0x100/0x100 [ 2616.719873] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2616.719889] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2616.719905] ? validate_nla+0x32f/0x810 [ 2616.719934] rtnl_newlink+0xbad/0x1600 [ 2616.719961] ? rtnl_link_unregister+0x250/0x250 [ 2616.719975] ? mark_held_locks+0x100/0x100 [ 2616.720003] ? is_bpf_text_address+0xac/0x170 [ 2616.720020] ? find_held_lock+0x35/0x130 [ 2616.720039] ? is_bpf_text_address+0xac/0x170 [ 2616.720059] ? __lock_acquire+0x6ee/0x49c0 [ 2616.720076] ? __lock_acquire+0x6ee/0x49c0 [ 2616.720093] ? lock_downgrade+0x880/0x880 [ 2616.720122] ? mark_held_locks+0x100/0x100 [ 2616.720140] ? mark_held_locks+0x100/0x100 [ 2616.720156] ? __kernel_text_address+0xd/0x40 [ 2616.720172] ? unwind_get_return_address+0x61/0xa0 [ 2616.720191] ? avc_has_perm_noaudit+0x38f/0x570 [ 2616.720213] ? __lock_acquire+0x6ee/0x49c0 [ 2616.720247] ? mark_held_locks+0x100/0x100 [ 2616.720264] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2616.720285] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2616.720303] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2616.720363] ? find_held_lock+0x35/0x130 [ 2616.720382] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2616.720402] ? find_held_lock+0xf0/0x130 [ 2616.720427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2616.720446] ? rtnl_link_unregister+0x250/0x250 [ 2616.720464] rtnetlink_rcv_msg+0x463/0xb00 [ 2616.720487] ? rtnetlink_put_metrics+0x560/0x560 [ 2616.720505] ? netdev_pick_tx+0x300/0x300 [ 2616.720524] ? netlink_deliver_tap+0x22d/0xc20 [ 2616.720541] ? find_held_lock+0x35/0x130 [ 2616.720564] netlink_rcv_skb+0x17d/0x460 [ 2616.720589] ? rtnetlink_put_metrics+0x560/0x560 [ 2616.720610] ? netlink_ack+0xb30/0xb30 [ 2616.720627] ? kasan_check_read+0x11/0x20 [ 2616.720650] ? netlink_deliver_tap+0x254/0xc20 [ 2616.720675] rtnetlink_rcv+0x1d/0x30 [ 2616.720692] netlink_unicast+0x53a/0x730 [ 2616.720715] ? netlink_attachskb+0x770/0x770 [ 2616.720735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.720757] netlink_sendmsg+0x8ae/0xd70 [ 2616.720782] ? netlink_unicast+0x730/0x730 [ 2616.720803] ? selinux_socket_sendmsg+0x36/0x40 [ 2616.720817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.720832] ? security_socket_sendmsg+0x8d/0xc0 [ 2616.720849] ? netlink_unicast+0x730/0x730 [ 2616.720868] sock_sendmsg+0xd7/0x130 [ 2616.720888] ___sys_sendmsg+0x803/0x920 [ 2616.720910] ? copy_msghdr_from_user+0x430/0x430 [ 2616.720932] ? lock_downgrade+0x880/0x880 [ 2616.720951] ? kasan_check_read+0x11/0x20 [ 2616.720972] ? __fget+0x367/0x540 [ 2616.720992] ? iterate_fd+0x360/0x360 [ 2616.721011] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2616.721035] ? __fget_light+0x1a9/0x230 [ 2616.721052] ? __fdget+0x1b/0x20 [ 2616.721066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2616.721084] __sys_sendmsg+0x105/0x1d0 [ 2616.721099] ? __ia32_sys_shutdown+0x80/0x80 [ 2616.721115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2616.721133] ? syscall_trace_enter+0x40c/0xe40 [ 2616.721159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2616.721175] ? do_syscall_64+0x26/0x620 [ 2616.721190] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.721205] ? do_syscall_64+0x26/0x620 [ 2616.721225] __x64_sys_sendmsg+0x78/0xb0 [ 2616.721243] do_syscall_64+0xfd/0x620 [ 2616.721262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2616.721274] RIP: 0033:0x45af49 [ 2616.721289] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2616.721299] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2616.721315] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 08:38:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], []]}, 0x585) 08:38:33 executing program 5 (fault-call:9 fault-nth:11): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:33 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xde01000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPSET_CMD_HEADER(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1022}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x4c, 0xc, 0x6, 0x401, 0x70bd28, 0x25dfdbff, {0x18}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x24040080) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="00008a8db27ec7000000001e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x6, 0x20000) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r5, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x8445}, 0x20000000) 08:38:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:33 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]]}, 0x120) [ 2616.721324] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2616.721333] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2616.721343] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2616.721352] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2616.974925] Dev loop1: unable to read RDB block 1 [ 2616.974957] loop1: unable to read partition table [ 2616.975190] loop1: partition table beyond EOD, truncated [ 2616.975206] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 08:38:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:33 executing program 5 (fault-call:9 fault-nth:12): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2618.609625] FAULT_INJECTION: forcing a failure. [ 2618.609625] name failslab, interval 1, probability 0, space 0, times 0 08:38:33 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xdf00000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2618.609646] CPU: 1 PID: 18011 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2618.609655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.609660] Call Trace: [ 2618.609680] dump_stack+0x197/0x210 [ 2618.609726] should_fail.cold+0xa/0x1b [ 2618.609748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2618.609766] ? lock_downgrade+0x880/0x880 [ 2618.609791] __should_failslab+0x121/0x190 [ 2618.609808] should_failslab+0x9/0x14 [ 2618.609823] kmem_cache_alloc_trace+0x2cc/0x760 [ 2618.609838] ? trace_hardirqs_on+0x67/0x220 [ 2618.609857] ? kobject_uevent_env+0x29f/0x1170 [ 2618.609875] ? dev_uevent_filter+0xe0/0xe0 [ 2618.609892] kobject_uevent_env+0x22c/0x1170 [ 2618.609905] ? trace_hardirqs_on+0x67/0x220 [ 2618.609933] kobject_uevent+0x20/0x30 [ 2618.609951] dev_change_net_namespace+0x7b8/0xc60 [ 2618.609966] ? security_capable+0x92/0xc0 [ 2618.609988] ? dev_close+0x80/0x80 [ 2618.610018] ? netlink_ns_capable+0x26/0x30 [ 2618.610043] do_setlink+0x1ac/0x3670 [ 2618.610061] ? mark_held_locks+0x100/0x100 08:38:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x200, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2618.610085] ? rtnl_getlink+0x6b0/0x6b0 [ 2618.610103] ? __lock_acquire+0x6ee/0x49c0 [ 2618.610119] ? is_bpf_text_address+0xac/0x170 [ 2618.610140] ? __lock_acquire+0x6ee/0x49c0 [ 2618.610164] ? __lock_acquire+0x6ee/0x49c0 [ 2618.610181] ? mark_held_locks+0x100/0x100 [ 2618.610206] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2618.610223] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2618.610239] ? validate_nla+0x32f/0x810 [ 2618.610270] rtnl_newlink+0xbad/0x1600 [ 2618.610295] ? rtnl_link_unregister+0x250/0x250 [ 2618.610308] ? mark_held_locks+0x100/0x100 [ 2618.610329] ? is_bpf_text_address+0xac/0x170 [ 2618.610343] ? find_held_lock+0x35/0x130 [ 2618.610359] ? is_bpf_text_address+0xac/0x170 [ 2618.610376] ? __lock_acquire+0x6ee/0x49c0 [ 2618.610392] ? __lock_acquire+0x6ee/0x49c0 [ 2618.610407] ? lock_downgrade+0x880/0x880 [ 2618.610432] ? mark_held_locks+0x100/0x100 [ 2618.610447] ? mark_held_locks+0x100/0x100 [ 2618.610461] ? __kernel_text_address+0xd/0x40 [ 2618.610475] ? unwind_get_return_address+0x61/0xa0 [ 2618.610493] ? avc_has_perm_noaudit+0x38f/0x570 [ 2618.610641] ? __lock_acquire+0x6ee/0x49c0 [ 2618.610677] ? mark_held_locks+0x100/0x100 [ 2618.610694] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2618.610713] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2618.610729] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2618.610786] ? find_held_lock+0x35/0x130 [ 2618.610804] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2618.610822] ? find_held_lock+0xf0/0x130 [ 2618.610847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2618.610864] ? rtnl_link_unregister+0x250/0x250 [ 2618.610880] rtnetlink_rcv_msg+0x463/0xb00 [ 2618.610899] ? rtnetlink_put_metrics+0x560/0x560 [ 2618.610914] ? netdev_pick_tx+0x300/0x300 [ 2618.610931] ? netlink_deliver_tap+0x22d/0xc20 [ 2618.610947] ? find_held_lock+0x35/0x130 [ 2618.610968] netlink_rcv_skb+0x17d/0x460 [ 2618.610985] ? rtnetlink_put_metrics+0x560/0x560 [ 2618.611002] ? netlink_ack+0xb30/0xb30 [ 2618.611017] ? kasan_check_read+0x11/0x20 [ 2618.611039] ? netlink_deliver_tap+0x254/0xc20 [ 2618.611064] rtnetlink_rcv+0x1d/0x30 [ 2618.611081] netlink_unicast+0x53a/0x730 [ 2618.611102] ? netlink_attachskb+0x770/0x770 [ 2618.611120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.611141] netlink_sendmsg+0x8ae/0xd70 [ 2618.611164] ? netlink_unicast+0x730/0x730 [ 2618.611185] ? selinux_socket_sendmsg+0x36/0x40 [ 2618.611198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2618.611212] ? security_socket_sendmsg+0x8d/0xc0 [ 2618.611228] ? netlink_unicast+0x730/0x730 [ 2618.611247] sock_sendmsg+0xd7/0x130 [ 2618.611265] ___sys_sendmsg+0x803/0x920 [ 2618.611286] ? copy_msghdr_from_user+0x430/0x430 [ 2618.611308] ? lock_downgrade+0x880/0x880 [ 2618.611328] ? kasan_check_read+0x11/0x20 [ 2618.611349] ? __fget+0x367/0x540 [ 2618.611371] ? iterate_fd+0x360/0x360 [ 2618.611399] ? __fget_light+0x1a9/0x230 [ 2618.611418] ? __fdget+0x1b/0x20 [ 2618.611432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2618.611450] __sys_sendmsg+0x105/0x1d0 [ 2618.611465] ? __ia32_sys_shutdown+0x80/0x80 [ 2618.611507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2618.611524] ? do_syscall_64+0x26/0x620 [ 2618.611538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2618.611552] ? do_syscall_64+0x26/0x620 [ 2618.611569] __x64_sys_sendmsg+0x78/0xb0 [ 2618.611587] do_syscall_64+0xfd/0x620 [ 2618.611604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2618.611615] RIP: 0033:0x45af49 [ 2618.611630] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2618.611639] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2618.611654] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2618.611663] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2618.611672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2618.611681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2618.611690] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2618.614332] Dev loop1: unable to read RDB block 1 [ 2618.614361] loop1: unable to read partition table [ 2618.614424] loop1: partition table beyond EOD, truncated [ 2618.614442] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2618.801441] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2618.801748] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2618.801762] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2618.801769] UDF-fs: Scanning with blocksize 512 failed [ 2618.803681] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2618.804532] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2618.804546] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2618.804554] UDF-fs: Scanning with blocksize 1024 failed [ 2618.805257] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2618.805991] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2618.806003] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2618.806011] UDF-fs: Scanning with blocksize 2048 failed [ 2618.807313] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2618.807474] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2618.807485] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2618.807493] UDF-fs: Scanning with blocksize 4096 failed [ 2618.807504] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2618.851122] FAULT_INJECTION: forcing a failure. [ 2618.851122] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.851142] CPU: 1 PID: 18130 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 08:38:34 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xdf01000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2618.851153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.851158] Call Trace: [ 2618.851181] dump_stack+0x197/0x210 [ 2618.851206] should_fail.cold+0xa/0x1b [ 2618.851229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2618.851249] ? lock_downgrade+0x880/0x880 [ 2618.851277] __should_failslab+0x121/0x190 [ 2618.851296] should_failslab+0x9/0x14 [ 2618.851306] __kmalloc+0x2e2/0x750 [ 2618.851326] ? rcu_read_lock_sched_held+0x110/0x130 [ 2619.511513] ? kobject_get_path+0xc2/0x1a0 [ 2619.511530] kobject_get_path+0xc2/0x1a0 [ 2619.511547] kobject_uevent_env+0x251/0x1170 [ 2619.511558] ? trace_hardirqs_on+0x67/0x220 08:38:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x0, 0x9], [], [], [], []]}, 0x585) 08:38:34 executing program 5 (fault-call:9 fault-nth:13): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2619.511577] kobject_uevent+0x20/0x30 [ 2619.511591] dev_change_net_namespace+0x7b8/0xc60 [ 2619.511603] ? security_capable+0x92/0xc0 [ 2619.511619] ? dev_close+0x80/0x80 [ 2619.511635] ? netlink_ns_capable+0x26/0x30 08:38:34 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xe000000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2619.511651] do_setlink+0x1ac/0x3670 [ 2619.511666] ? mark_held_locks+0x100/0x100 [ 2619.511681] ? rtnl_getlink+0x6b0/0x6b0 08:38:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x2000000000010d, 0xa, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x8, 0x4) r2 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2619.511692] ? __lock_acquire+0x6ee/0x49c0 [ 2619.511705] ? is_bpf_text_address+0xac/0x170 [ 2619.511719] ? __lock_acquire+0x6ee/0x49c0 [ 2619.511734] ? __lock_acquire+0x6ee/0x49c0 [ 2619.511744] ? mark_held_locks+0x100/0x100 [ 2619.511761] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2619.511771] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2619.511784] ? validate_nla+0x32f/0x810 [ 2619.511804] rtnl_newlink+0xbad/0x1600 [ 2619.511823] ? rtnl_link_unregister+0x250/0x250 [ 2619.511834] ? mark_held_locks+0x100/0x100 [ 2619.511853] ? is_bpf_text_address+0xac/0x170 [ 2619.511864] ? find_held_lock+0x35/0x130 [ 2619.511876] ? is_bpf_text_address+0xac/0x170 [ 2619.511890] ? __lock_acquire+0x6ee/0x49c0 [ 2619.511902] ? __lock_acquire+0x6ee/0x49c0 [ 2619.511912] ? lock_downgrade+0x880/0x880 [ 2619.511939] ? mark_held_locks+0x100/0x100 [ 2619.511950] ? mark_held_locks+0x100/0x100 [ 2619.511962] ? __kernel_text_address+0xd/0x40 [ 2619.511973] ? unwind_get_return_address+0x61/0xa0 [ 2619.511988] ? avc_has_perm_noaudit+0x38f/0x570 [ 2619.512002] ? __lock_acquire+0x6ee/0x49c0 [ 2619.512025] ? mark_held_locks+0x100/0x100 [ 2619.512036] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2619.512049] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2619.512061] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2619.512099] ? find_held_lock+0x35/0x130 [ 2619.512111] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2619.512124] ? find_held_lock+0xf0/0x130 [ 2619.512140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2619.512152] ? rtnl_link_unregister+0x250/0x250 [ 2619.512163] rtnetlink_rcv_msg+0x463/0xb00 [ 2619.512178] ? rtnetlink_put_metrics+0x560/0x560 [ 2619.512190] ? netdev_pick_tx+0x300/0x300 [ 2619.512202] ? netlink_deliver_tap+0x22d/0xc20 [ 2619.512213] ? find_held_lock+0x35/0x130 [ 2619.512229] netlink_rcv_skb+0x17d/0x460 [ 2619.512242] ? rtnetlink_put_metrics+0x560/0x560 [ 2619.512254] ? netlink_ack+0xb30/0xb30 [ 2619.512267] ? kasan_check_read+0x11/0x20 [ 2619.512281] ? netlink_deliver_tap+0x254/0xc20 [ 2619.512297] rtnetlink_rcv+0x1d/0x30 [ 2619.512307] netlink_unicast+0x53a/0x730 [ 2619.512322] ? netlink_attachskb+0x770/0x770 [ 2619.512335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.512349] netlink_sendmsg+0x8ae/0xd70 [ 2619.512365] ? netlink_unicast+0x730/0x730 [ 2619.512380] ? selinux_socket_sendmsg+0x36/0x40 [ 2619.512389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.512399] ? security_socket_sendmsg+0x8d/0xc0 [ 2619.512409] ? netlink_unicast+0x730/0x730 [ 2619.512424] sock_sendmsg+0xd7/0x130 [ 2619.512438] ___sys_sendmsg+0x803/0x920 [ 2619.512451] ? copy_msghdr_from_user+0x430/0x430 [ 2619.512466] ? lock_downgrade+0x880/0x880 [ 2619.512478] ? kasan_check_read+0x11/0x20 [ 2619.512492] ? __fget+0x367/0x540 [ 2619.512506] ? iterate_fd+0x360/0x360 [ 2619.512520] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2619.512535] ? __fget_light+0x1a9/0x230 [ 2619.512546] ? __fdget+0x1b/0x20 [ 2619.512556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2619.512569] __sys_sendmsg+0x105/0x1d0 [ 2619.512579] ? __ia32_sys_shutdown+0x80/0x80 [ 2619.512590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2619.512602] ? syscall_trace_enter+0x40c/0xe40 [ 2619.512619] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2619.512630] ? do_syscall_64+0x26/0x620 [ 2619.512641] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.512650] ? do_syscall_64+0x26/0x620 [ 2619.512664] __x64_sys_sendmsg+0x78/0xb0 [ 2619.512676] do_syscall_64+0xfd/0x620 [ 2619.512688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.512697] RIP: 0033:0x45af49 [ 2619.512710] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2619.512715] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2619.512726] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2619.512732] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2619.512739] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2619.512745] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2619.512751] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2619.546485] Dev loop1: unable to read RDB block 1 [ 2619.546519] loop1: unable to read partition table [ 2619.546587] loop1: partition table beyond EOD, truncated [ 2619.546605] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2619.705762] nbd_handle_cmd: 26 callbacks suppressed [ 2619.705778] block nbd0: Attempted send on invalid socket [ 2619.705799] print_req_error: 26 callbacks suppressed [ 2619.705808] print_req_error: I/O error, dev nbd0, sector 64 [ 2619.707938] block nbd0: Attempted send on invalid socket [ 2619.707956] print_req_error: I/O error, dev nbd0, sector 256 [ 2619.708001] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2619.708238] block nbd0: Attempted send on invalid socket [ 2619.708252] print_req_error: I/O error, dev nbd0, sector 512 [ 2619.709882] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2619.709896] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2619.709904] UDF-fs: Scanning with blocksize 512 failed [ 2619.710359] block nbd0: Attempted send on invalid socket [ 2619.710375] print_req_error: I/O error, dev nbd0, sector 64 [ 2619.713084] block nbd0: Attempted send on invalid socket [ 2619.713100] print_req_error: I/O error, dev nbd0, sector 512 [ 2619.714025] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2619.714207] block nbd0: Attempted send on invalid socket [ 2619.714222] print_req_error: I/O error, dev nbd0, sector 1024 [ 2619.715138] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2619.715150] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2619.715158] UDF-fs: Scanning with blocksize 1024 failed [ 2619.715487] block nbd0: Attempted send on invalid socket [ 2619.715502] print_req_error: I/O error, dev nbd0, sector 64 [ 2619.715680] block nbd0: Attempted send on invalid socket [ 2619.715694] print_req_error: I/O error, dev nbd0, sector 1024 [ 2619.717415] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2619.717581] block nbd0: Attempted send on invalid socket [ 2619.717597] print_req_error: I/O error, dev nbd0, sector 2048 [ 2619.719202] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2619.719216] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2619.719224] UDF-fs: Scanning with blocksize 2048 failed [ 2619.719495] block nbd0: Attempted send on invalid socket [ 2619.719510] print_req_error: I/O error, dev nbd0, sector 64 [ 2619.721025] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2619.721191] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2619.721202] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2619.721210] UDF-fs: Scanning with blocksize 4096 failed [ 2619.721219] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) [ 2619.830021] Dev loop1: unable to read RDB block 1 [ 2619.830051] loop1: unable to read partition table [ 2619.830115] loop1: partition table beyond EOD, truncated [ 2619.830131] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2619.858848] FAULT_INJECTION: forcing a failure. [ 2619.858848] name failslab, interval 1, probability 0, space 0, times 0 [ 2619.858868] CPU: 0 PID: 18600 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2619.858877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2619.858882] Call Trace: [ 2619.858898] dump_stack+0x197/0x210 [ 2619.858921] should_fail.cold+0xa/0x1b [ 2619.858934] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2619.858946] ? lock_downgrade+0x880/0x880 [ 2619.858963] __should_failslab+0x121/0x190 [ 2619.858974] should_failslab+0x9/0x14 [ 2619.858981] kmem_cache_alloc_node+0x26c/0x710 [ 2619.858997] __alloc_skb+0xd5/0x5f0 [ 2619.859007] ? skb_trim+0x190/0x190 [ 2619.859018] ? rcu_read_lock_sched_held+0x110/0x130 [ 2619.859032] alloc_uevent_skb+0x86/0x220 [ 2619.859043] ? dev_attr_store+0x80/0x80 [ 2619.859053] kobject_uevent_env+0xe5d/0x1170 [ 2619.859062] ? trace_hardirqs_on+0x67/0x220 [ 2619.859076] kobject_uevent+0x20/0x30 [ 2619.859086] dev_change_net_namespace+0x7b8/0xc60 [ 2619.859095] ? security_capable+0x92/0xc0 [ 2619.859107] ? dev_close+0x80/0x80 [ 2619.859119] ? netlink_ns_capable+0x26/0x30 [ 2619.859132] do_setlink+0x1ac/0x3670 [ 2619.859142] ? mark_held_locks+0x100/0x100 [ 2619.859154] ? rtnl_getlink+0x6b0/0x6b0 [ 2619.859164] ? __lock_acquire+0x6ee/0x49c0 [ 2619.859173] ? is_bpf_text_address+0xac/0x170 [ 2619.859185] ? __lock_acquire+0x6ee/0x49c0 [ 2619.859198] ? __lock_acquire+0x6ee/0x49c0 [ 2619.859206] ? mark_held_locks+0x100/0x100 [ 2619.859220] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2619.859228] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2619.859237] ? validate_nla+0x32f/0x810 [ 2619.859253] rtnl_newlink+0xbad/0x1600 [ 2619.859269] ? rtnl_link_unregister+0x250/0x250 [ 2619.859277] ? mark_held_locks+0x100/0x100 [ 2619.859292] ? is_bpf_text_address+0xac/0x170 [ 2619.859301] ? find_held_lock+0x35/0x130 [ 2619.859311] ? is_bpf_text_address+0xac/0x170 [ 2619.859322] ? __lock_acquire+0x6ee/0x49c0 [ 2619.859331] ? __lock_acquire+0x6ee/0x49c0 [ 2619.859340] ? lock_downgrade+0x880/0x880 [ 2619.859355] ? mark_held_locks+0x100/0x100 [ 2619.859364] ? mark_held_locks+0x100/0x100 [ 2619.859374] ? __kernel_text_address+0xd/0x40 [ 2619.859383] ? unwind_get_return_address+0x61/0xa0 [ 2619.859393] ? avc_has_perm_noaudit+0x38f/0x570 [ 2619.859405] ? __lock_acquire+0x6ee/0x49c0 [ 2619.859422] ? mark_held_locks+0x100/0x100 [ 2619.859431] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2619.859443] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2619.859452] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2619.859482] ? find_held_lock+0x35/0x130 [ 2619.859492] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2619.859502] ? find_held_lock+0xf0/0x130 [ 2619.859516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2619.859526] ? rtnl_link_unregister+0x250/0x250 [ 2619.859536] rtnetlink_rcv_msg+0x463/0xb00 [ 2619.859547] ? rtnetlink_put_metrics+0x560/0x560 [ 2619.859557] ? netdev_pick_tx+0x300/0x300 [ 2619.859567] ? netlink_deliver_tap+0x22d/0xc20 [ 2619.859577] ? find_held_lock+0x35/0x130 [ 2619.859588] netlink_rcv_skb+0x17d/0x460 [ 2619.859599] ? rtnetlink_put_metrics+0x560/0x560 [ 2619.859609] ? netlink_ack+0xb30/0xb30 [ 2619.859618] ? kasan_check_read+0x11/0x20 [ 2619.859630] ? netlink_deliver_tap+0x254/0xc20 [ 2619.859642] rtnetlink_rcv+0x1d/0x30 [ 2619.859651] netlink_unicast+0x53a/0x730 [ 2619.859664] ? netlink_attachskb+0x770/0x770 [ 2619.859676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.859695] netlink_sendmsg+0x8ae/0xd70 [ 2619.859720] ? netlink_unicast+0x730/0x730 [ 2619.859741] ? selinux_socket_sendmsg+0x36/0x40 [ 2619.859756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.859771] ? security_socket_sendmsg+0x8d/0xc0 [ 2619.859787] ? netlink_unicast+0x730/0x730 [ 2619.859805] sock_sendmsg+0xd7/0x130 [ 2619.859824] ___sys_sendmsg+0x803/0x920 [ 2619.859845] ? copy_msghdr_from_user+0x430/0x430 [ 2619.859861] ? lock_downgrade+0x880/0x880 [ 2619.859871] ? kasan_check_read+0x11/0x20 [ 2619.859883] ? __fget+0x367/0x540 [ 2619.859896] ? iterate_fd+0x360/0x360 [ 2619.859930] ? __fget_light+0x1a9/0x230 [ 2619.859950] ? __fdget+0x1b/0x20 [ 2619.859965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2619.859983] __sys_sendmsg+0x105/0x1d0 [ 2619.859993] ? __ia32_sys_shutdown+0x80/0x80 [ 2619.860013] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2619.860023] ? do_syscall_64+0x26/0x620 [ 2619.860033] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.860041] ? do_syscall_64+0x26/0x620 [ 2619.860052] __x64_sys_sendmsg+0x78/0xb0 [ 2619.860062] do_syscall_64+0xfd/0x620 [ 2619.860073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.860080] RIP: 0033:0x45af49 [ 2619.860091] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2619.860095] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2619.860104] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2619.860109] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2619.860114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2619.860119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2619.860125] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2620.028740] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2620.029089] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2620.029101] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2620.029109] UDF-fs: Scanning with blocksize 512 failed [ 2620.029872] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2620.030072] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2620.030083] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2620.030091] UDF-fs: Scanning with blocksize 1024 failed [ 2620.030588] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 [ 2620.030753] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2620.030764] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2620.030771] UDF-fs: Scanning with blocksize 2048 failed [ 2620.031294] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=256, location=256 08:38:36 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000640)={{0x0, 0x0, 0x0, 0x1cd, 0xcd, 0xd953, 0x2ad}, "", [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]]}, 0x120) 08:38:36 executing program 5 (fault-call:9 fault-nth:14): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 08:38:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:38:36 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xe001000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) flistxattr(r2, &(0x7f0000000080)=""/48, 0x30) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6400000000c50116a9ac893fccf3b54b8a5fac00000000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) 08:38:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000140), 0xa, 0xffffffffffffffff, 0x1}) dup(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd202003e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e16580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db16dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf27756b4218c40f487a4dda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5402e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27141cf860e90c1aee60272677e"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x2, [0x3, 0x2]}, 0x8) write$binfmt_aout(r5, &(0x7f0000000640)={{0x107, 0x7, 0x7f, 0x1cd, 0xcd, 0xd953, 0x2ad, 0x1ff}, "fc50cb6e83098483f444927c263b0cd1c808b20c11058434dee2e01dc78d3dc1ad5b27717f7d12bf9ee4ec59efca66f8e6f752f3e6db08b4cf642c4c032054b9e61dfad9a1e9e3312fbb78b0f285a9691418ec38a9763128d30cef67c8a58b8538ef7880b7", [[0x0, 0x0, 0x0, 0x0, 0xa], [], [], [], []]}, 0x585) [ 2620.031462] UDF-fs: error (device nbd0): udf_read_tagged: read failed, block=512, location=512 [ 2620.031473] UDF-fs: warning (device nbd0): udf_load_vrs: No anchor found [ 2620.031481] UDF-fs: Scanning with blocksize 4096 failed [ 2620.031490] UDF-fs: warning (device nbd0): udf_fill_super: No partition found (1) 08:38:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000080)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/bd0\x00\x00\x00\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x0, 0x0) [ 2621.509549] Dev loop1: unable to read RDB block 1 [ 2621.509582] loop1: unable to read partition table 08:38:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2621.509648] loop1: partition table beyond EOD, truncated 08:38:36 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xe100000000000000, 0xd, &(0x7f0000000180)=""/238) 08:38:36 executing program 5 (fault-call:9 fault-nth:15): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff05, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100767863616e00000404000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 2621.509664] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2621.553344] FAULT_INJECTION: forcing a failure. [ 2621.553344] name failslab, interval 1, probability 0, space 0, times 0 [ 2621.553366] CPU: 1 PID: 18976 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2621.553377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2621.553382] Call Trace: [ 2621.553405] dump_stack+0x197/0x210 [ 2621.553430] should_fail.cold+0xa/0x1b [ 2621.553454] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2621.553473] ? lock_downgrade+0x880/0x880 [ 2621.553500] __should_failslab+0x121/0x190 [ 2621.553518] should_failslab+0x9/0x14 [ 2621.553533] kmem_cache_alloc_node_trace+0x274/0x720 08:38:36 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xe101000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2621.553552] ? __alloc_skb+0xd5/0x5f0 [ 2621.553575] __kmalloc_node_track_caller+0x3d/0x80 [ 2621.553595] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2621.553617] __alloc_skb+0x10b/0x5f0 [ 2621.553636] ? skb_trim+0x190/0x190 [ 2621.553656] ? rcu_read_lock_sched_held+0x110/0x130 [ 2621.553681] alloc_uevent_skb+0x86/0x220 [ 2621.553701] ? dev_attr_store+0x80/0x80 [ 2621.553720] kobject_uevent_env+0xe5d/0x1170 [ 2621.553735] ? trace_hardirqs_on+0x67/0x220 [ 2621.553764] kobject_uevent+0x20/0x30 [ 2621.553781] dev_change_net_namespace+0x7b8/0xc60 [ 2621.553797] ? security_capable+0x92/0xc0 [ 2621.553820] ? dev_close+0x80/0x80 [ 2621.553842] ? netlink_ns_capable+0x26/0x30 [ 2621.553866] do_setlink+0x1ac/0x3670 [ 2621.553886] ? mark_held_locks+0x100/0x100 [ 2621.553910] ? rtnl_getlink+0x6b0/0x6b0 [ 2621.553927] ? __lock_acquire+0x6ee/0x49c0 [ 2621.553943] ? is_bpf_text_address+0xac/0x170 [ 2621.553964] ? __lock_acquire+0x6ee/0x49c0 [ 2621.553989] ? __lock_acquire+0x6ee/0x49c0 [ 2621.554005] ? mark_held_locks+0x100/0x100 [ 2621.554029] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2621.554042] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2621.554057] ? validate_nla+0x32f/0x810 [ 2621.554088] rtnl_newlink+0xbad/0x1600 [ 2621.554120] ? rtnl_link_unregister+0x250/0x250 [ 2621.554136] ? mark_held_locks+0x100/0x100 [ 2621.554165] ? is_bpf_text_address+0xac/0x170 [ 2621.554185] ? find_held_lock+0x35/0x130 [ 2621.554201] ? is_bpf_text_address+0xac/0x170 [ 2621.554220] ? __lock_acquire+0x6ee/0x49c0 [ 2621.554236] ? __lock_acquire+0x6ee/0x49c0 [ 2621.554252] ? lock_downgrade+0x880/0x880 [ 2621.554281] ? mark_held_locks+0x100/0x100 [ 2621.554298] ? mark_held_locks+0x100/0x100 [ 2621.554313] ? __kernel_text_address+0xd/0x40 [ 2621.554328] ? unwind_get_return_address+0x61/0xa0 [ 2621.554357] ? avc_has_perm_noaudit+0x38f/0x570 [ 2621.554381] ? __lock_acquire+0x6ee/0x49c0 [ 2621.554416] ? mark_held_locks+0x100/0x100 [ 2621.554434] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2621.554456] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2621.554474] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2621.554534] ? find_held_lock+0x35/0x130 08:38:36 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r0, 0xe200000000000000, 0xd, &(0x7f0000000180)=""/238) [ 2621.554553] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2621.554573] ? find_held_lock+0xf0/0x130 [ 2621.554600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2621.554619] ? rtnl_link_unregister+0x250/0x250 [ 2621.554638] rtnetlink_rcv_msg+0x463/0xb00 [ 2621.554661] ? rtnetlink_put_metrics+0x560/0x560 [ 2621.554679] ? netdev_pick_tx+0x300/0x300 [ 2621.554699] ? netlink_deliver_tap+0x22d/0xc20 [ 2621.554717] ? find_held_lock+0x35/0x130 [ 2621.554741] netlink_rcv_skb+0x17d/0x460 [ 2621.554760] ? rtnetlink_put_metrics+0x560/0x560 [ 2621.554781] ? netlink_ack+0xb30/0xb30 [ 2621.554798] ? kasan_check_read+0x11/0x20 [ 2621.554820] ? netlink_deliver_tap+0x254/0xc20 [ 2621.554843] rtnetlink_rcv+0x1d/0x30 [ 2621.554860] netlink_unicast+0x53a/0x730 [ 2621.554884] ? netlink_attachskb+0x770/0x770 [ 2621.554904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.554939] netlink_sendmsg+0x8ae/0xd70 [ 2621.554966] ? netlink_unicast+0x730/0x730 [ 2621.554989] ? selinux_socket_sendmsg+0x36/0x40 [ 2621.555005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.555019] ? security_socket_sendmsg+0x8d/0xc0 [ 2621.555036] ? netlink_unicast+0x730/0x730 [ 2621.555055] sock_sendmsg+0xd7/0x130 [ 2621.555076] ___sys_sendmsg+0x803/0x920 [ 2621.555098] ? copy_msghdr_from_user+0x430/0x430 [ 2621.555122] ? lock_downgrade+0x880/0x880 [ 2621.555140] ? kasan_check_read+0x11/0x20 [ 2621.555160] ? __fget+0x367/0x540 [ 2621.555181] ? iterate_fd+0x360/0x360 [ 2621.555204] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2621.555229] ? __fget_light+0x1a9/0x230 [ 2621.555247] ? __fdget+0x1b/0x20 [ 2621.555261] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2621.555279] __sys_sendmsg+0x105/0x1d0 [ 2621.555296] ? __ia32_sys_shutdown+0x80/0x80 [ 2621.555312] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2621.555329] ? syscall_trace_enter+0x40c/0xe40 [ 2621.555364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2621.555382] ? do_syscall_64+0x26/0x620 [ 2621.555399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.555416] ? do_syscall_64+0x26/0x620 [ 2621.555436] __x64_sys_sendmsg+0x78/0xb0 [ 2621.555455] do_syscall_64+0xfd/0x620 [ 2621.555475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.555487] RIP: 0033:0x45af49 [ 2621.555504] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2621.555513] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2621.555528] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2621.555538] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2621.555547] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2621.555556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2621.555566] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2621.821398] Dev loop1: unable to read RDB block 1 [ 2622.119138] FAULT_INJECTION: forcing a failure. [ 2622.119138] name failslab, interval 1, probability 0, space 0, times 0 [ 2622.120802] loop1: unable to read partition table [ 2622.133344] CPU: 0 PID: 19309 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2622.135696] loop1: partition table beyond EOD, truncated [ 2622.137809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.147536] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2622.151407] Call Trace: [ 2622.151431] dump_stack+0x197/0x210 [ 2622.151454] should_fail.cold+0xa/0x1b [ 2622.151473] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2622.151492] ? lock_downgrade+0x880/0x880 [ 2622.364494] __should_failslab+0x121/0x190 [ 2622.364514] should_failslab+0x9/0x14 [ 2622.364530] __kmalloc_track_caller+0x2de/0x750 [ 2622.364551] ? device_rename+0x88/0x200 [ 2622.364571] kstrdup+0x3a/0x70 [ 2622.364587] device_rename+0x88/0x200 [ 2622.364609] dev_change_net_namespace+0x56e/0xc60 [ 2622.364632] ? dev_close+0x80/0x80 [ 2622.364665] do_setlink+0x1ac/0x3670 [ 2622.364686] ? mark_held_locks+0x100/0x100 [ 2622.364710] ? rtnl_getlink+0x6b0/0x6b0 [ 2622.364728] ? __lock_acquire+0x6ee/0x49c0 [ 2622.364752] ? is_bpf_text_address+0xac/0x170 [ 2622.364774] ? __lock_acquire+0x6ee/0x49c0 [ 2622.364799] ? __lock_acquire+0x6ee/0x49c0 [ 2622.364815] ? mark_held_locks+0x100/0x100 [ 2622.364839] ? __lock_acquire+0x6ee/0x49c0 [ 2622.364855] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2622.364871] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2622.364889] ? validate_nla+0x32f/0x810 [ 2622.364919] rtnl_newlink+0xbad/0x1600 [ 2622.364951] ? rtnl_link_unregister+0x250/0x250 [ 2622.364967] ? mark_held_locks+0x100/0x100 [ 2622.364996] ? is_bpf_text_address+0xac/0x170 [ 2622.365014] ? find_held_lock+0x35/0x130 [ 2622.365033] ? is_bpf_text_address+0xac/0x170 [ 2622.365054] ? __lock_acquire+0x6ee/0x49c0 [ 2622.365072] ? __lock_acquire+0x6ee/0x49c0 [ 2622.365088] ? lock_downgrade+0x880/0x880 [ 2622.365117] ? mark_held_locks+0x100/0x100 [ 2622.365136] ? mark_held_locks+0x100/0x100 [ 2622.365152] ? __kernel_text_address+0xd/0x40 [ 2622.365169] ? unwind_get_return_address+0x61/0xa0 [ 2622.365189] ? avc_has_perm_noaudit+0x38f/0x570 [ 2622.365211] ? __lock_acquire+0x6ee/0x49c0 [ 2622.365245] ? mark_held_locks+0x100/0x100 [ 2622.365261] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2622.365282] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2622.365301] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2622.365360] ? find_held_lock+0x35/0x130 [ 2622.365379] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2622.365399] ? find_held_lock+0xf0/0x130 [ 2622.365425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2622.365443] ? rtnl_link_unregister+0x250/0x250 [ 2622.365462] rtnetlink_rcv_msg+0x463/0xb00 [ 2622.365484] ? rtnetlink_put_metrics+0x560/0x560 [ 2622.365502] ? netdev_pick_tx+0x300/0x300 [ 2622.365523] ? netlink_deliver_tap+0x22d/0xc20 [ 2622.365541] ? find_held_lock+0x35/0x130 [ 2622.365565] netlink_rcv_skb+0x17d/0x460 [ 2622.365584] ? rtnetlink_put_metrics+0x560/0x560 [ 2622.365605] ? netlink_ack+0xb30/0xb30 [ 2622.365622] ? kasan_check_read+0x11/0x20 [ 2622.365645] ? netlink_deliver_tap+0x254/0xc20 [ 2622.365670] rtnetlink_rcv+0x1d/0x30 [ 2622.365687] netlink_unicast+0x53a/0x730 [ 2622.365712] ? netlink_attachskb+0x770/0x770 [ 2622.365732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2622.365761] netlink_sendmsg+0x8ae/0xd70 [ 2622.365786] ? netlink_unicast+0x730/0x730 [ 2622.365809] ? selinux_socket_sendmsg+0x36/0x40 [ 2622.365823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2622.365838] ? security_socket_sendmsg+0x8d/0xc0 [ 2622.365855] ? netlink_unicast+0x730/0x730 [ 2622.365875] sock_sendmsg+0xd7/0x130 [ 2622.365894] ___sys_sendmsg+0x803/0x920 [ 2622.365917] ? copy_msghdr_from_user+0x430/0x430 [ 2622.365940] ? lock_downgrade+0x880/0x880 [ 2622.365958] ? kasan_check_read+0x11/0x20 [ 2622.365977] ? __fget+0x367/0x540 [ 2622.365994] ? iterate_fd+0x360/0x360 [ 2622.366012] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2622.366032] ? __fget_light+0x1a9/0x230 [ 2622.366047] ? __fdget+0x1b/0x20 [ 2622.366060] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2622.366077] __sys_sendmsg+0x105/0x1d0 [ 2622.366091] ? __ia32_sys_shutdown+0x80/0x80 [ 2622.366106] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2622.366123] ? syscall_trace_enter+0x40c/0xe40 [ 2622.366147] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2622.366162] ? do_syscall_64+0x26/0x620 [ 2622.366176] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2622.366189] ? do_syscall_64+0x26/0x620 [ 2622.366207] __x64_sys_sendmsg+0x78/0xb0 [ 2622.366224] do_syscall_64+0xfd/0x620 [ 2622.366240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2622.366252] RIP: 0033:0x45af49 [ 2622.366267] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2622.366275] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2622.366289] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2622.366297] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2622.366305] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2622.366314] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2622.366322] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2622.375870] ------------[ cut here ]------------ [ 2622.376519] WARNING: CPU: 1 PID: 19309 at net/core/dev.c:9441 dev_change_net_namespace.cold+0x11/0x18 [ 2622.376527] Kernel panic - not syncing: panic_on_warn set ... [ 2622.376527] [ 2622.376542] CPU: 1 PID: 19309 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 2622.376550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.376555] Call Trace: [ 2622.376574] dump_stack+0x197/0x210 [ 2622.376593] panic+0x26a/0x50e [ 2622.376607] ? __warn_printk+0xf3/0xf3 [ 2622.376629] ? dev_change_net_namespace.cold+0x11/0x18 [ 2622.376643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2622.376656] ? __warn.cold+0x5/0x53 [ 2622.376675] ? dev_change_net_namespace.cold+0x11/0x18 [ 2622.376688] __warn.cold+0x20/0x53 [ 2622.376706] ? dev_change_net_namespace.cold+0x11/0x18 [ 2622.376721] report_bug+0x263/0x2b0 [ 2622.376743] do_error_trap+0x204/0x360 [ 2622.376759] ? math_error+0x340/0x340 [ 2622.376774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2622.376789] ? wake_up_klogd+0x99/0xd0 [ 2622.376805] ? vprintk_emit+0x1ce/0x6d0 [ 2622.376821] ? error_entry+0x7c/0xe0 [ 2622.376837] ? trace_hardirqs_off_caller+0x65/0x220 [ 2622.376859] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2622.376880] do_invalid_op+0x1b/0x20 [ 2622.376893] invalid_op+0x14/0x20 [ 2622.376909] RIP: 0010:dev_change_net_namespace.cold+0x11/0x18 [ 2622.376924] Code: 87 88 01 e8 b8 c9 a2 fb e8 33 4a da fb 48 c7 c7 a0 c0 4a 88 e8 df 87 88 01 e8 a2 c9 a2 fb 48 c7 c7 60 93 4a 88 e8 2a 2d 8d fb <0f> 0b e9 60 37 fd ff e8 8a c9 a2 fb 44 89 f9 4c 89 e2 48 c7 c6 e0 [ 2622.376932] RSP: 0018:ffff888014bdecb0 EFLAGS: 00010286 [ 2622.376943] RAX: 0000000000000024 RBX: 00000000fffffff4 RCX: 0000000000000000 [ 2622.376952] RDX: 0000000000000000 RSI: ffffffff81558bc6 RDI: ffffed100297bd88 [ 2622.376960] RBP: ffff888014bdedb0 R08: 0000000000000024 R09: ffffed1015d25079 [ 2622.376968] R10: ffffed1015d25078 R11: ffff8880ae9283c7 R12: ffff888088382b40 [ 2622.376978] R13: ffff888088382be8 R14: ffff888088382bf0 R15: ffffffff89a02d80 [ 2622.377002] ? vprintk_func+0x86/0x189 [ 2622.377026] ? dev_close+0x80/0x80 [ 2622.377056] do_setlink+0x1ac/0x3670 [ 2622.377071] ? mark_held_locks+0x100/0x100 [ 2622.377087] ? rtnl_getlink+0x6b0/0x6b0 [ 2622.377100] ? __lock_acquire+0x6ee/0x49c0 [ 2622.377114] ? is_bpf_text_address+0xac/0x170 [ 2622.377135] ? __lock_acquire+0x6ee/0x49c0 [ 2622.377157] ? __lock_acquire+0x6ee/0x49c0 [ 2622.377170] ? mark_held_locks+0x100/0x100 [ 2622.377202] ? __lock_acquire+0x6ee/0x49c0 [ 2622.377216] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2622.377231] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2622.377254] ? validate_nla+0x32f/0x810 [ 2622.377284] rtnl_newlink+0xbad/0x1600 [ 2622.377314] ? rtnl_link_unregister+0x250/0x250 [ 2622.377329] ? mark_held_locks+0x100/0x100 [ 2622.377357] ? is_bpf_text_address+0xac/0x170 [ 2622.377374] ? find_held_lock+0x35/0x130 [ 2622.377393] ? is_bpf_text_address+0xac/0x170 [ 2622.377413] ? __lock_acquire+0x6ee/0x49c0 [ 2622.377430] ? __lock_acquire+0x6ee/0x49c0 [ 2622.377445] ? lock_downgrade+0x880/0x880 [ 2622.377472] ? mark_held_locks+0x100/0x100 [ 2622.377488] ? mark_held_locks+0x100/0x100 [ 2622.377504] ? __kernel_text_address+0xd/0x40 [ 2622.377520] ? unwind_get_return_address+0x61/0xa0 [ 2622.377540] ? avc_has_perm_noaudit+0x38f/0x570 [ 2622.377562] ? __lock_acquire+0x6ee/0x49c0 [ 2622.377592] ? mark_held_locks+0x100/0x100 [ 2622.377608] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2622.377627] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2622.377644] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2622.377700] ? find_held_lock+0x35/0x130 [ 2622.377718] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2622.377736] ? find_held_lock+0xf0/0x130 [ 2622.377759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2623.171913] ? rtnl_link_unregister+0x250/0x250 [ 2623.171930] rtnetlink_rcv_msg+0x463/0xb00 [ 2623.171952] ? rtnetlink_put_metrics+0x560/0x560 [ 2623.171968] ? netdev_pick_tx+0x300/0x300 [ 2623.171988] ? netlink_deliver_tap+0x22d/0xc20 [ 2623.172005] ? find_held_lock+0x35/0x130 [ 2623.172026] netlink_rcv_skb+0x17d/0x460 [ 2623.172046] ? rtnetlink_put_metrics+0x560/0x560 [ 2623.207315] ? netlink_ack+0xb30/0xb30 [ 2623.207330] ? kasan_check_read+0x11/0x20 [ 2623.207351] ? netlink_deliver_tap+0x254/0xc20 [ 2623.207374] rtnetlink_rcv+0x1d/0x30 [ 2623.207390] netlink_unicast+0x53a/0x730 [ 2623.207411] ? netlink_attachskb+0x770/0x770 [ 2623.207430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2623.207452] netlink_sendmsg+0x8ae/0xd70 [ 2623.242204] ? netlink_unicast+0x730/0x730 [ 2623.242224] ? selinux_socket_sendmsg+0x36/0x40 [ 2623.242238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2623.242252] ? security_socket_sendmsg+0x8d/0xc0 [ 2623.242268] ? netlink_unicast+0x730/0x730 [ 2623.242287] sock_sendmsg+0xd7/0x130 [ 2623.242305] ___sys_sendmsg+0x803/0x920 [ 2623.242325] ? copy_msghdr_from_user+0x430/0x430 [ 2623.242347] ? lock_downgrade+0x880/0x880 [ 2623.242366] ? kasan_check_read+0x11/0x20 [ 2623.242386] ? __fget+0x367/0x540 [ 2623.242405] ? iterate_fd+0x360/0x360 [ 2623.242424] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2623.242445] ? __fget_light+0x1a9/0x230 [ 2623.242461] ? __fdget+0x1b/0x20 [ 2623.242475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2623.242493] __sys_sendmsg+0x105/0x1d0 [ 2623.242507] ? __ia32_sys_shutdown+0x80/0x80 [ 2623.242522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2623.242538] ? syscall_trace_enter+0x40c/0xe40 [ 2623.242562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2623.242577] ? do_syscall_64+0x26/0x620 [ 2623.242593] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2623.242607] ? do_syscall_64+0x26/0x620 [ 2623.242625] __x64_sys_sendmsg+0x78/0xb0 [ 2623.242643] do_syscall_64+0xfd/0x620 [ 2623.242661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2623.242672] RIP: 0033:0x45af49 [ 2623.242688] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2623.242696] RSP: 002b:00007f75b3355c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2623.242710] RAX: ffffffffffffffda RBX: 00007f75b3355c90 RCX: 000000000045af49 [ 2623.242723] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 2623.242731] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2623.242740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b33566d4 [ 2623.242748] R13: 00000000004caa0f R14: 00000000004e3eb0 R15: 0000000000000009 [ 2623.245020] Kernel Offset: disabled [ 2623.434310] Rebooting in 86400 seconds..