Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 64.808782][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 64.808793][ T26] audit: type=1800 audit(1574573775.702:39): pid=9261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 64.859517][ T26] audit: type=1800 audit(1574573775.702:40): pid=9261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 69.034124][ T26] audit: type=1400 audit(1574573779.922:41): avc: denied { map } for pid=9439 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.210' (ECDSA) to the list of known hosts. 2019/11/24 05:36:26 fuzzer started [ 75.600680][ T26] audit: type=1400 audit(1574573786.492:42): avc: denied { map } for pid=9448 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/11/24 05:36:28 dialing manager at 10.128.0.26:43109 2019/11/24 05:36:28 syscalls: 2589 2019/11/24 05:36:28 code coverage: enabled 2019/11/24 05:36:28 comparison tracing: enabled 2019/11/24 05:36:28 extra coverage: extra coverage is not supported by the kernel 2019/11/24 05:36:28 setuid sandbox: enabled 2019/11/24 05:36:28 namespace sandbox: enabled 2019/11/24 05:36:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/24 05:36:28 fault injection: enabled 2019/11/24 05:36:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/24 05:36:28 net packet injection: enabled 2019/11/24 05:36:28 net device setup: enabled 2019/11/24 05:36:28 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/24 05:36:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 05:39:23 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xb82, 0x2000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000100)) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000140)={0x0, "d73c1b959b9ae10aa139cb02bb9fc211ce2e5792b41b3023e052887c253bbd6d", 0x2, 0x6, 0x72, 0x20, 0x2}) r3 = memfd_create(&(0x7f00000001c0)='\\vboxnet1cpuset\x00', 0x4) flock(r3, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x4, 0x0, 0x10000, 0x8}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f0000000280)={r5, 0x5}) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$IMGETCOUNT(r6, 0x80044943, &(0x7f0000000300)) r7 = msgget$private(0x0, 0x182) msgctl$IPC_INFO(r7, 0x3, &(0x7f0000000340)=""/32) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$USBDEVFS_SUBMITURB(r8, 0x8038550a, &(0x7f0000000480)=@urb_type_iso={0x0, {0xe, 0x1}, 0x0, 0x2, &(0x7f00000003c0)="7ed238ce18df36bea628c8", 0xb, 0xfffffff7, 0x800, 0xf, 0xc83, 0x0, &(0x7f0000000400)="f9da959828245948387ccf098151967da93bc8996d2462e9568699283e80727920faf139b1c49ca8557107df63e248f8d704cd97384fc2a3364dbbaf28cea8748a8bc976aa51c5c575dde54d12638046549e4690680d862d3e055972ce2245eacbb069e36008c7a217621194047187e40eb014d6d7e8c32b", [{0x200, 0x2, 0x5}, {0x5ad, 0x3ff, 0xfff}, {0x7ff, 0x37d3, 0x5}, {0x10000, 0x0, 0x6}, {0x7f, 0x8, 0xff}, {0xadf7, 0x20, 0xffff}, {0x3, 0x20, 0x3ff}, {0x1, 0x200, 0x200}, {0x80000001, 0x6, 0x8000000}, {0xfffffffa, 0xc5}, {0x6, 0x2}, {0x45b, 0x80}, {0x3, 0x400, 0x1}, {0x10000, 0x1, 0xff}, {0x1, 0x3, 0x4}]}) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000580)={0x2, 0x9, [{0x1, 0x0, 0x1}, {0x1, 0x0, 0x8}]}) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) dup3(r9, r6, 0x0) r10 = socket$kcm(0x29, 0x2, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000680)={'ipddp0\x00', r11}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r6, 0x0, 0x7, &(0x7f00000006c0)='ipddp0\x00', 0xffffffffffffffff}, 0x30) sched_getscheduler(r12) r13 = openat$null(0xffffffffffffff9c, &(0x7f0000000740)='/dev/null\x00', 0x4000, 0x0) bind$rxrpc(r13, &(0x7f0000000780)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @empty}}, 0x24) r14 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r14, &(0x7f0000000800)={0xf97cff8c, 0x8, 'SE Linux', "3e41df5010c0592d214509618c1c6c541416a0c62530747c1dc5a3f334f0bd94511a17fc7d9e9e995b8c55becda414a3a688a5a5e204612fb875bd12bcc3cb7b4143bd4093b37e69a9c75ae7d5bc232ea72e7a6103e4423cc52fe7ae0da25aa46c823953de82f1bb845ed5779e43392141293b64968805ab2ba01e66c1198678cea88c0b2318b4e7cddd3993bd45274b34cf26"}, 0xa3) r15 = syz_open_dev$ndb(&(0x7f00000008c0)='/dev/nbd#\x00', 0x0, 0x242000) fsetxattr$smack_xattr_label(r15, &(0x7f0000000900)='security.SMACK64MMAP\x00', &(0x7f0000000940)={'/dev/null\x00'}, 0xb, 0x0) [ 252.284240][ T26] audit: type=1400 audit(1574573963.172:43): avc: denied { map } for pid=9464 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=2653 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 05:39:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x220000, 0x20) r1 = syz_open_pts(r0, 0x141001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x13) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r1, 0x80c, r4) getcwd(&(0x7f0000000100)=""/4096, 0x1000) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f00000011c0)={0x0, 0x2f, "48a5c954da9ad875c3f28325788cb6d3bb582dcbfe44c10b87fcf2dc284a473005a81ab537b93af0180707ee248cae"}, &(0x7f0000001200)=0x37) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000001240)={r6, @in6={{0xa, 0x4e21, 0x8000, @loopback, 0x95}}}, 0x84) r7 = openat$cgroup(r0, &(0x7f0000001300)='syz1\x00', 0x200002, 0x0) fsetxattr$trusted_overlay_redirect(r7, &(0x7f0000001340)='trusted.overlay.redirect\x00', &(0x7f0000001380)='./file0\x00', 0x8, 0x1) r8 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$int_in(r8, 0x5452, &(0x7f00000013c0)=0x200) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001400)={0x101, 0x2, 0x8000, 0x7fff, 0x9, 0x21, 0x3, 0xffffffe1, 0x0}, &(0x7f0000001440)=0x20) geteuid() r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20ncci\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000014c0)={r9, 0x10000}, &(0x7f0000001500)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f0000001540)={r11, 0x9, 0x3, 0x782, 0x0, 0x1}, &(0x7f0000001580)=0x14) r12 = accept4$vsock_stream(r3, &(0x7f00000015c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x0) fcntl$F_GET_FILE_RW_HINT(r12, 0x40d, &(0x7f0000001600)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000001640)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_MAGIC(r13, 0x80046402, &(0x7f0000001680)) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000001700)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000016c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r13, &(0x7f0000001740)={0x8, 0x120, 0xfa00, {0x2, {0xb8b0, 0x3, "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", 0x40, 0x1, 0x3, 0x40, 0x3d, 0x80, 0x7}, r14}}, 0x128) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000001880)={0x180000000000, 0x4}) r15 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000019c0)={0x0, 0x7}, &(0x7f0000001a00)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r15, 0x84, 0x72, &(0x7f0000001a40)={r16, 0xa5a, 0x30}, &(0x7f0000001a80)=0xc) r17 = syz_open_dev$swradio(&(0x7f0000001ac0)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$bt_rfcomm_RFCOMM_LM(r17, 0x12, 0x3, &(0x7f0000001b00), &(0x7f0000001b40)=0x4) [ 252.528086][ T9465] IPVS: ftp: loaded support on port[0] = 21 [ 252.668064][ T9468] IPVS: ftp: loaded support on port[0] = 21 05:39:23 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000000)=0xb6af, 0x4) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f0000000040)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000880)='/dev/vcs\x00', 0x400000, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f00000008c0)={0x0, 0xffff}) r2 = syz_open_dev$amidi(&(0x7f0000000900)='/dev/amidi#\x00', 0x7ff, 0x32401) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000980)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x4001}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x2c, r3, 0x20a, 0x70bd2a, 0x8, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000a80)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000ac0)=0x100000) r5 = syz_open_dev$mouse(&(0x7f0000000b00)='/dev/input/mouse#\x00', 0x3, 0x400) sendto$unix(r5, &(0x7f0000000b40)="fcec4abb622fa2091c2d2328d5b61d4698e034b554eb1c80f73329ea54a20f84f541abf0d017c74d62ac3542effc18463999a40c889785dd39e71871dd2ec8b44ac2cd9f6ad6d53ce26d54642f8869ad232a077a7ca50a964c9d4325467a960056de180df87e3f97494551795752fcede109e617", 0x74, 0xe41d3b314b231280, &(0x7f0000000bc0)=@file={0x1, './file0\x00'}, 0x6e) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r6, 0x4038ae7a, &(0x7f0000000e00)={0x800, 0xc0011036, &(0x7f0000000c80)="a38ae9d801516304dab951c2db65c2bf745c9f1e02490e837616813ff8789a6c28a4a31a1db79c080c68e4011e774315c5ecf07d5fc75e209ea1bbf4fb5453f6d51dd831efa33b704070437f4d9aaf533ab2b6672d784c0afb06e4982dbb6630b273b015e55b0a51d6ab4a2d6b579d95dc10b110176cc7aeacd98502ad8bded52d64cc550ebfa57a497252c59c22b64f79940fd9ad530cfdd6cb3d", &(0x7f0000000d40)="4425f2e2eb00f2706562e6b5f366ed57d4b69c434722889af8710161c90ef3a9d49f9ab943dea0167ba130abbe159c38e91f90687bdf0bd949149caa87c25162c100bd875ba048fb776f5e22f3d76ec02af9a554ecfe790bf86b0a58c79ee45579ac45fce170517ec19e21553bb9c711860e387a32d6eae1bf1823e1772a91585dd144971bce1c9aba734a978179c27b33465e3c6e42a1d2c9d02e5a934a6c273574ae77bf24e5af7482681061df23d3f0ecde62", 0x9b, 0xb4}) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/mixer\x00', 0x400000, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000ec0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000e40)="08087ad7871325b399a2b353a99843bb214d6d362c4b0c672081b4f17bf7", 0x1e, r7}, 0x68) r8 = accept4$unix(0xffffffffffffffff, &(0x7f0000000f40)=@abs, &(0x7f0000000fc0)=0x6e, 0x80000) lseek(r8, 0x8001, 0x2) clock_adjtime(0x2, &(0x7f0000001000)={0x44, 0x8, 0x3ff, 0x98, 0x4, 0x8, 0x8a8, 0x100, 0x53e, 0xfffffffffffffff8, 0x7, 0x6, 0x4, 0x8, 0x356, 0x9, 0x3, 0x4, 0x2, 0x7, 0x2, 0x2, 0x4fc8, 0x100000001, 0x1, 0x9}) r9 = syz_open_dev$mice(&(0x7f0000001100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000001140)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000001240)=0xe8) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000001340)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000001400)={0x0, 0x78, &(0x7f0000001380)=[@in6={0xa, 0x4e22, 0x6, @mcast1, 0x4}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0xffffbc23, @mcast2, 0xfffffffb}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @rand_addr=0x6}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f0000001440)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r10, 0x84, 0x79, &(0x7f0000001480)={r11, 0x7ff, 0x9}, 0x8) r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000014c0)='/selinux/checkreqprot\x00', 0x9609cbf6fe70f46a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001500)={0xffffffffffffffff}, 0x8a, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r12, &(0x7f0000001580)={0xa, 0x4, 0xfa00, {r13}}, 0xc) recvfrom$llc(r2, &(0x7f00000015c0)=""/119, 0x77, 0x40000000, &(0x7f0000001640)={0x1a, 0x100, 0xfd, 0x40, 0xff, 0x5, @random="901b386a00ba"}, 0x10) r14 = socket$bt_cmtp(0x1f, 0x3, 0x5) fcntl$setstatus(r14, 0x4, 0x44000) [ 252.717296][ T9465] chnl_net:caif_netlink_parms(): no params data found [ 252.816315][ T9465] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.823492][ T9465] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.834915][ T9465] device bridge_slave_0 entered promiscuous mode [ 252.858987][ T9465] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.866430][ T9465] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.874502][ T9465] device bridge_slave_1 entered promiscuous mode [ 252.888488][ T9468] chnl_net:caif_netlink_parms(): no params data found [ 252.959732][ T9465] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.989740][ T9465] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.021276][ T9468] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.036691][ T9471] IPVS: ftp: loaded support on port[0] = 21 [ 253.045636][ T9468] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.055401][ T9468] device bridge_slave_0 entered promiscuous mode 05:39:24 executing program 3: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="a96e24773cb04c01e38a31d80e8f73d5bd815d4cf7e10b2a842be656a89ccc15bc0a8b", 0x23, 0xfffffffffffffffb) r1 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='md5sumsecuritysecurity\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r0, 0x0, 0x0, r1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r3, r4) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x7fffffff) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x500000, 0x0) write$selinux_create(r5, &(0x7f00000003c0)=@objname={'system_u:object_r:systemd_systemctl_exec_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x4, 0x20, './file0\x00'}, 0x62) r6 = accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000940)) getsockopt$SO_TIMESTAMP(r6, 0x1, 0x1d, &(0x7f0000000980), &(0x7f00000009c0)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SET_TSC(0x1a, 0x1) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/dlm-monitor\x00', 0x20400, 0x0) setsockopt$bt_BT_POWER(r7, 0x112, 0x9, &(0x7f0000000a40)=0x3f, 0x1) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) io_setup(0xfad, &(0x7f0000000b00)) getpeername$ax25(r7, &(0x7f0000000b40)={{0x3, @rose}, [@netrom, @rose, @default, @remote, @netrom, @netrom, @bcast, @rose]}, &(0x7f0000000bc0)=0x48) pipe2(&(0x7f0000000c00)={0xffffffffffffffff}, 0x80800) ioctl$KDSETMODE(r8, 0x4b3a, 0x7fff) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000c40)='/selinux/enforce\x00', 0x520003, 0x0) getsockopt$CAN_RAW_FILTER(r9, 0x65, 0x1, &(0x7f0000000c80)=[{}], &(0x7f0000000cc0)=0x8) setxattr$security_evm(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)='security.evm\x00', &(0x7f0000000d80)=@ng={0x4, 0x8, "65713ce4"}, 0x6, 0x2) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000dc0)='/selinux/user\x00', 0x2, 0x0) r10 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000e00)='/proc/capi/capi20\x00', 0x1000, 0x0) ioctl$TIOCSCTTY(r10, 0x540e, 0x8) quotactl(0x4, &(0x7f0000000e40)='./file0\x00', r3, &(0x7f0000000e80)="eb3e90e476f9922cb6567be491fb8778c3e1fc2ebdff47f696ae8356e805d9da51261fb93c20a038818c9d7a1a6386605e4902a9c88aa344038851e7d8acc2b2b393a81e475e17aaafb814ebb5425b19c18daec0d8ead7d29e651403a2a319cf48766b5ce04fafd80a4f3cf0d9f0eeb90c45d295088e096a1de1c65f39629bf157a360e3b455971e554f9919ecde3759e509b6dcf1a1d74ebf51bbf4e4c9ca611332ecf2ef9a9f9f5a996f4794818cda1285ed7f4d35383b345be1") r11 = syz_open_dev$admmidi(&(0x7f0000001100)='/dev/admmidi#\x00', 0x1, 0x540300) sendmsg$nl_route(r11, &(0x7f0000001200)={&(0x7f0000001140), 0xc, &(0x7f00000011c0)={&(0x7f0000001180)=@bridge_setlink={0x34, 0x13, 0x8, 0x70bd2a, 0x25dfdbfb, {0x7, 0x0, 0x0, r2, 0x24000, 0x1}, [@IFLA_ADDRESS={0xc, 0x1, @remote}, @IFLA_MTU={0x8, 0xe, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) setsockopt$bt_BT_FLUSHABLE(r10, 0x112, 0x8, &(0x7f0000001240)=0x9, 0x4) [ 253.087414][ T9468] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.094535][ T9468] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.103043][ T9468] device bridge_slave_1 entered promiscuous mode [ 253.112612][ T9465] team0: Port device team_slave_0 added [ 253.144842][ T9465] team0: Port device team_slave_1 added [ 253.166773][ T9468] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.199201][ T9468] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 05:39:24 executing program 4: r0 = socket(0x8, 0xa, 0x2b) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000080)=0x80) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r1}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[r4, r5]}, 0x2) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x1040, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x2203, &(0x7f0000000280)) r7 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x9, 0x40000) ioctl$KVM_SET_CPUID(r7, 0x4008ae8a, &(0x7f0000000300)={0x8, 0x0, [{0x80000008, 0x7, 0x401, 0x0, 0x2}, {0xc0000000, 0x6, 0xb3, 0x4, 0x1}, {0x80000000, 0x4, 0x5, 0x40, 0x8001}, {0x4, 0x128a00, 0x7f, 0x20fc8103, 0x80}, {0x80000019, 0x4, 0x7, 0x8, 0x4}, {0x7, 0x8, 0x7f, 0xb8, 0x10001}, {0x7, 0x80, 0x7, 0x3, 0x8}, {0x7, 0x623a, 0x1, 0xa5f489e5, 0x4}]}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000400)={'vcan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) fcntl$setown(r0, 0x8, r8) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f00000004c0)=0x3, 0x4) r9 = perf_event_open$cgroup(&(0x7f0000000540)={0x5, 0x70, 0x9, 0xfe, 0x0, 0x1, 0x0, 0x4db57032, 0x4000, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000500), 0x4}, 0xb1c4283a82a2bb5e, 0x80000000, 0x7f, 0x4, 0x46e45209, 0x1, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000005c0)='/dev/mixer\x00') r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/autofs\x00', 0x10000, 0x0) setsockopt$RDS_CONG_MONITOR(r10, 0x114, 0x6, &(0x7f0000000640)=0x1, 0x4) setsockopt$X25_QBITINCL(r6, 0x106, 0x1, &(0x7f0000000680)=0x1, 0x4) fsetxattr$security_smack_transmute(r0, &(0x7f00000006c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000700)='TRUE', 0x4, 0x3) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000740)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f00000007c0)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}, 0x40, 0x0, 0x0, 0x0, 0x75, &(0x7f0000000780)='batadv0\x00', 0x9, 0x6, 0x3f}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000840)={{0x0, 0x5}, 'port1\x00', 0xd9, 0x20, 0xfca, 0x1f, 0x3, 0x0, 0x17c, 0x0, 0x3134e911fcb61ce, 0x5}) r11 = syz_open_dev$cec(&(0x7f0000000900)='/dev/cec#\x00', 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) r13 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/mls\x00', 0x0, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000f80)={&(0x7f0000000940), 0xc, &(0x7f0000000f40)={&(0x7f0000000a00)=@delchain={0x50c, 0x65, 0x4, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r12, {0xfff6, 0xffe3}, {0xfff2, 0x2}, {0xb, 0xfff1}}, [@TCA_CHAIN={0x8, 0xb, 0x1}, @TCA_CHAIN={0x8, 0xb, 0x80000000}, @TCA_RATE={0x8, 0x5, {0x8, 0x3f}}, @filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x4bc, 0x2, [@TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_FD={0x8, 0x6, r6}, @TCA_BPF_ACT={0x60, 0x1, @m_xt={0x5c, 0x1d, {{0x8, 0x1, 'xt\x00'}, {0x28, 0x2, [@TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x24, 0x6, "d230f7d49e2144502ed5551b042cd602312c41b66cb1ad959c7fa95c0c1505c5"}}}}, @TCA_BPF_OPS={{0x8, 0x4, 0x5}, {0x2c, 0x5, [{0xfff7, 0x6, 0x2, 0x5}, {0x3, 0x1, 0x5, 0x80000000}, {0x1f, 0x5, 0x40, 0x5}, {0x101, 0xf9, 0x6, 0x7ff}, {0x0, 0xfd, 0x80, 0x4}]}}, @TCA_BPF_FD={0x8, 0x6, r13}, @TCA_BPF_POLICE={0x408, 0x2, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8, 0x80000000, 0x64, 0x8, 0x47, 0x1, 0x20000000, 0xffffffff, 0x1, 0x40, 0x4, 0x8, 0x4, 0x8001, 0x1000000, 0x5, 0x3, 0x2, 0x0, 0x1d2, 0x400, 0xffff0001, 0x8, 0x1000, 0x0, 0x9, 0x619, 0x1000, 0x5, 0x7, 0xe694, 0x1, 0xcd70, 0x7ff, 0x4, 0x7, 0x3, 0xfd4, 0x533, 0x3, 0x4b, 0x10001, 0x800, 0x49, 0x8, 0x9, 0xff, 0x7fffffff, 0x3, 0xcb, 0x9, 0x7fff, 0xff, 0x80000000, 0x8001, 0x5, 0x2, 0x100, 0x3, 0x8001, 0x401, 0x80000000, 0x1f, 0x3, 0x9, 0x9a, 0x0, 0x2, 0x6, 0x2, 0x8, 0xfff, 0x62cb, 0x800, 0x6, 0x0, 0x1f, 0x9, 0x4, 0x2, 0x8, 0x0, 0x80, 0x1, 0x5, 0x2, 0x8, 0x1f, 0x2, 0x10000, 0x1ff, 0x1, 0x1, 0x1, 0x1, 0x6, 0x800, 0x3ff, 0x7f, 0x4, 0x6, 0x6, 0x1, 0x10001, 0x9, 0x5, 0x5, 0x1f2, 0x1, 0x1, 0x8, 0x9, 0x4, 0x2, 0x800, 0x10000, 0x8000, 0x100, 0x1, 0x100, 0xffffff34, 0x0, 0xdba, 0x3, 0x8, 0xfffffffe, 0x3, 0x10001, 0x5, 0x6, 0x8001, 0x1, 0x0, 0x6, 0x2, 0xffffff7f, 0x0, 0x6, 0xfff, 0x1, 0x400000, 0x2, 0x3, 0x81, 0x200, 0x0, 0x8001, 0x101, 0x7f, 0x5, 0xffff, 0x7fffffff, 0xfffffffa, 0x9, 0x9, 0x0, 0x200, 0x7f, 0x7a1b, 0xffff8d04, 0x0, 0x8, 0x5, 0x6f74, 0x5, 0x3, 0x3, 0x800, 0x4, 0x1, 0x4, 0x7, 0x8, 0x4000000, 0x400, 0x1000, 0x7, 0x1ff, 0xc75, 0x0, 0xfffffff8, 0x5, 0xffffffff, 0x9, 0x8, 0x100, 0x9, 0x3, 0x10000, 0x0, 0xffffff52, 0xfffffff9, 0x7, 0x7258, 0xfffff506, 0x1000, 0xfffffffd, 0x2c9c, 0xffff, 0x1, 0x3, 0x5, 0x6, 0x4, 0x1, 0x0, 0x5d64, 0x5, 0x1, 0x1c14ea4a, 0x6, 0xfffff44d, 0x7fffffff, 0x80000001, 0x9, 0x5, 0x2, 0xffffff74, 0x10000, 0xd, 0x2, 0x4, 0x3, 0x9, 0x8, 0x9, 0x3f, 0x801, 0xfff, 0x5, 0x0, 0x4, 0x3f, 0x1ae4, 0x2, 0x8, 0x20, 0x800, 0x4, 0x80, 0x800, 0x40, 0x128b, 0x100, 0x7, 0x2, 0x4, 0x80, 0x4, 0x0, 0x3aa, 0x3, 0x7fffffff, 0x1, 0x7, 0x8000]}}]}}, @TCA_CHAIN={0x8, 0xb, 0x2}]}, 0x50c}, 0x1, 0x0, 0x0, 0x44000}, 0x0) r14 = open(&(0x7f0000000fc0)='./file0\x00', 0x405002, 0x8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001040)=0x14) connect$packet(r14, &(0x7f0000001080)={0x11, 0x1, r15, 0x1, 0x3f}, 0x14) [ 253.388651][ T9465] device hsr_slave_0 entered promiscuous mode [ 253.475677][ T9465] device hsr_slave_1 entered promiscuous mode [ 253.536942][ T9468] team0: Port device team_slave_0 added [ 253.561864][ T9468] team0: Port device team_slave_1 added [ 253.587203][ T9471] chnl_net:caif_netlink_parms(): no params data found [ 253.602186][ T9474] IPVS: ftp: loaded support on port[0] = 21 [ 253.653349][ T9476] IPVS: ftp: loaded support on port[0] = 21 05:39:24 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x52e5651fb2daabdf) signalfd(r0, &(0x7f0000000040)={0xfff}, 0x8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in=@remote, 0x4e23, 0x400, 0x4e20, 0x4, 0xa, 0x90, 0x20, 0x8, 0x0, r1}, {0x7, 0x7, 0x1, 0x401, 0x8, 0x1, 0xff, 0xffff}, {0xfffffffffffffffe, 0x1, 0x6cef0000, 0x3}, 0x7, 0x6e6bb0, 0x0, 0x0, 0x1, 0x2}, {{@in6=@loopback, 0x4d3, 0x2b}, 0x4, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3505, 0x2, 0x0, 0x3, 0x80000000, 0x1f, 0x5}}, 0xe8) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) mmap$usbfs(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xc, 0x810, r2, 0x5) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x55e) r4 = perf_event_open$cgroup(&(0x7f0000000340)={0x1, 0x70, 0x5a, 0x7, 0x34, 0x0, 0x0, 0x401, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x3, @perf_config_ext={0x7, 0x7}, 0x1090, 0x3, 0x0, 0x3, 0x2, 0x5, 0x8}, 0xffffffffffffffff, 0x5, r2, 0x8) fchdir(r4) write$P9_RVERSION(r0, &(0x7f00000003c0)={0x15, 0x65, 0xffff, 0x8, 0x8, '9P2000.L'}, 0x15) alarm(0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x1000, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000440)={0x0, 0x2b}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000004c0)={r6, 0xa23}, 0x8) r7 = accept4$rose(r3, &(0x7f0000000500)=@short={0xb, @dev, @null, 0x1, @null}, &(0x7f0000000540)=0x1c, 0x80000) rename(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00') ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x8) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/btrfs-control\x00', 0x191000, 0x0) fcntl$getown(r8, 0x9) r9 = dup(0xffffffffffffffff) ioctl$PPPOEIOCDFWD(r9, 0xb101, 0x0) bind$llc(r3, &(0x7f0000000640)={0x1a, 0x305, 0x2c, 0x2, 0x40, 0x7, @dev={[], 0x18}}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f00000007c0)={0x7, 0x5, 0x61, 0x101, &(0x7f0000000680)=[{}, {}, {}, {}, {}]}) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write$uinput_user_dev(r10, &(0x7f0000000880)={'syz0\x00', {0x5, 0x3, 0x1, 0x7ff}, 0x1, [0x0, 0x2, 0x7fff, 0x200, 0x7f, 0x0, 0x4e, 0x1ff, 0xfffffff9, 0xffffffff, 0x3e, 0x0, 0xb6, 0x200, 0x4, 0x2, 0x1, 0x80000000, 0x0, 0x40, 0x7, 0xf726, 0x8, 0x7cff, 0x9, 0x1, 0x1, 0x2, 0x6, 0x401, 0x7ff, 0x7ff, 0x0, 0x7, 0xac3, 0x7f, 0x6, 0x8, 0x2, 0x2ad, 0x7014, 0x5, 0x7, 0x41e3, 0x5, 0x401, 0xffff, 0x3, 0xfffffff8, 0x6, 0x6, 0x1, 0xfffffffa, 0xff, 0x7, 0x6, 0x0, 0x2, 0x1000, 0x7, 0x0, 0xffffff00, 0xfffffffb, 0x8001], [0x54, 0x2, 0x7fff, 0x1ff, 0x7, 0x9, 0x1, 0x9, 0xed, 0x9, 0x7, 0x7fffffff, 0x8, 0x7ff, 0x200, 0xe3d, 0x3, 0xffffffbc, 0x0, 0x10001, 0x943, 0x1, 0x3, 0x1f, 0x1, 0x1, 0x80000000, 0xfff, 0x5, 0x7, 0xfffffbff, 0xffffffd3, 0x58, 0x1ff, 0x4, 0x3, 0x7, 0xffffffe1, 0xb1, 0x0, 0x7f, 0x101, 0x3ff, 0x7, 0x20, 0x6, 0x3ff, 0x2, 0x9, 0x5, 0x100, 0x80000000, 0x6, 0xfff, 0x10001, 0x0, 0x3, 0xfffffffb, 0x400, 0x6, 0x0, 0x4, 0xeb2c, 0x9], [0xfff, 0x4, 0x1, 0x90fb, 0x80000001, 0x401, 0xed, 0x7, 0x2c, 0x944, 0x200, 0x9, 0x6d5, 0x6, 0x4, 0x40, 0x6, 0x30, 0xffffffff, 0x3, 0x4, 0x8001, 0x400, 0x10001, 0xd04, 0x80000001, 0xdd1, 0x4d6d, 0x0, 0x7fffffff, 0x4, 0x40, 0x0, 0x2, 0x7f, 0x4, 0x9, 0xdc, 0xfffffff9, 0x20000000, 0xc00, 0x10000, 0x7f, 0x3266, 0x19d, 0x4, 0x4, 0x30, 0x3, 0x7f, 0x400, 0x7fffffff, 0x7fff, 0x0, 0x4, 0x8001, 0x3, 0x8dd, 0x33, 0x1, 0x3363, 0xe8, 0x200, 0x1], [0x9798, 0x8000, 0x3, 0x0, 0x7, 0x4, 0x8000, 0x5, 0xe, 0x200, 0x2, 0x0, 0x6, 0x1ff, 0x1, 0x1000, 0x8, 0x1, 0xc0000000, 0x7fff, 0x7, 0x1f, 0x4, 0x9, 0xb3, 0x6, 0x5, 0x9, 0x7fffffff, 0x6, 0x5bb, 0x6, 0x4, 0x1, 0x80000000, 0x7f, 0x4, 0x7ff, 0x1, 0x4d773704, 0x401, 0x8, 0x1, 0x6, 0x2, 0x6, 0x7275, 0x5, 0x2, 0xff, 0xd4c, 0xfffff934, 0x1000, 0xfffffffa, 0x200, 0xfffffffe, 0x6, 0xa25, 0xc4, 0x7fff, 0x8, 0x6, 0xff, 0x1]}, 0x45c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/snapshot\x00', 0x20000, 0x0) getsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000d40), &(0x7f0000000d80)=0x4) r11 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000dc0)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r11, 0xc0305616, &(0x7f0000000e00)={0x0, {0x9, 0xf5}}) [ 253.738340][ T9468] device hsr_slave_0 entered promiscuous mode [ 253.785605][ T9468] device hsr_slave_1 entered promiscuous mode [ 253.845321][ T9468] debugfs: Directory 'hsr0' with parent '/' already present! [ 253.990704][ T26] audit: type=1400 audit(1574573964.882:44): avc: denied { create } for pid=9465 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 254.135812][ T26] audit: type=1400 audit(1574573964.882:45): avc: denied { write } for pid=9465 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 254.285292][ T26] audit: type=1400 audit(1574573964.882:46): avc: denied { read } for pid=9465 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 254.438290][ T9471] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.465209][ T9471] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.478989][ T9471] device bridge_slave_0 entered promiscuous mode [ 254.544330][ T9494] IPVS: ftp: loaded support on port[0] = 21 [ 254.605496][ T9471] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.612610][ T9471] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.656506][ T9471] device bridge_slave_1 entered promiscuous mode [ 254.952806][ T9471] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 255.007437][ T9471] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.382247][ T9474] chnl_net:caif_netlink_parms(): no params data found [ 255.437859][ T9465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.450247][ T9471] team0: Port device team_slave_0 added [ 255.466102][ T9476] chnl_net:caif_netlink_parms(): no params data found [ 255.565027][ T9468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.601009][ T9471] team0: Port device team_slave_1 added [ 255.749865][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.802073][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.827413][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.871663][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.941466][ T9465] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.962091][ T9468] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.023986][ T9471] device hsr_slave_0 entered promiscuous mode [ 256.075787][ T9471] device hsr_slave_1 entered promiscuous mode [ 256.135403][ T9471] debugfs: Directory 'hsr0' with parent '/' already present! [ 256.180480][ T9474] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.187746][ T9474] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.198695][ T9474] device bridge_slave_0 entered promiscuous mode [ 256.207387][ T9474] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.214455][ T9474] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.222597][ T9474] device bridge_slave_1 entered promiscuous mode [ 256.232847][ T9476] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.240579][ T9476] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.250715][ T9476] device bridge_slave_0 entered promiscuous mode [ 256.261071][ T9476] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.268239][ T9476] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.276656][ T9476] device bridge_slave_1 entered promiscuous mode [ 256.300385][ T9476] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.312628][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.323943][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.333108][ T3515] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.340393][ T3515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.360560][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.369737][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.378241][ T3515] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.385329][ T3515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.393093][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.401198][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.412666][ T9476] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.451543][ T9494] chnl_net:caif_netlink_parms(): no params data found [ 256.497032][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.509195][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.524138][ T9530] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.531480][ T9530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.551131][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.566683][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.581861][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.591774][ T9530] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.598937][ T9530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.631623][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.679052][ T9474] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.720293][ T9474] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.769088][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.789049][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.804943][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.844076][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.863719][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.901895][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.925892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.934717][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.958237][ T9476] team0: Port device team_slave_0 added [ 257.036299][ T9476] team0: Port device team_slave_1 added [ 257.066765][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.076219][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.112520][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.152087][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.176283][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.231723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.256418][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.311894][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.342300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.361903][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.403728][ T9468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.462235][ T9465] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 257.482256][ T9465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.493649][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.509819][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.547036][ T9474] team0: Port device team_slave_0 added [ 257.557148][ T9494] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.564263][ T9494] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.591668][ T9494] device bridge_slave_0 entered promiscuous mode [ 257.616755][ T9494] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.623872][ T9494] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.650588][ T9494] device bridge_slave_1 entered promiscuous mode [ 257.684713][ T9474] team0: Port device team_slave_1 added [ 257.704259][ T9468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.748379][ T9476] device hsr_slave_0 entered promiscuous mode [ 257.785598][ T9476] device hsr_slave_1 entered promiscuous mode [ 257.825589][ T9476] debugfs: Directory 'hsr0' with parent '/' already present! [ 257.840680][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 257.849896][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 257.937864][ T9474] device hsr_slave_0 entered promiscuous mode [ 257.995618][ T9474] device hsr_slave_1 entered promiscuous mode [ 258.055313][ T9474] debugfs: Directory 'hsr0' with parent '/' already present! [ 258.065913][ T9494] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 258.124965][ T9494] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 258.172203][ T9465] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 258.227019][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 258.239461][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.271101][ T26] audit: type=1400 audit(1574573969.162:47): avc: denied { associate } for pid=9468 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 258.391870][ T9471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.534421][ T9494] team0: Port device team_slave_0 added [ 258.753731][ T9494] team0: Port device team_slave_1 added [ 258.840366][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.860016][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.931672][ T9471] 8021q: adding VLAN 0 to HW filter on device team0 05:39:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x4000000004002, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x381040) fcntl$notify(r4, 0x402, 0x6) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r5, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000093, 0x2759, 0xd, 0x0, 0x0, r3, &(0x7f0000000000)="98", 0x3e80000000}]) [ 259.159065][ T9494] device hsr_slave_0 entered promiscuous mode [ 259.215909][ T9494] device hsr_slave_1 entered promiscuous mode [ 259.288156][ T9640] SELinux: policydb version 1356808510 does not match my version range 15-31 [ 259.305331][ T9494] debugfs: Directory 'hsr0' with parent '/' already present! [ 259.460011][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.495918][ T9640] SELinux: failed to load policy [ 259.507483][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.600133][ T3020] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.607345][ T3020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.613112][ T9652] SELinux: policydb version 1356808510 does not match my version range 15-31 [ 259.713734][ T9652] SELinux: failed to load policy [ 259.720146][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.800495][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 05:39:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='sessionid\x00') ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000280)=0x9) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, r4, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb598ec6d}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf03}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x34004001}, 0x40000) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x200600) [ 259.846861][ T3020] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.854026][ T3020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.967307][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.101133][ T9476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.197567][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.226310][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.316735][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 05:39:31 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x9a0000, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f90a, 0xd408, [], @p_u8=&(0x7f0000000040)}}) r1 = socket(0x10, 0x80002, 0x0) close(r1) connect$tipc(r1, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492805, 0x0) r2 = socket(0x10, 0x80002, 0x0) close(r2) connect$tipc(r2, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r2, &(0x7f0000000140), 0x492492492492805, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f508300200000040847bc2fdffe8cd918b035041291559f3ee3aacfb33c6af9680d512f4d8a5c51817c3ff01a1f62ac71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f7894ee47382b8811e658a49a0eba9b9d6a05995f5ed199fcf8722be75fa42c080601d48e793d1429196b4d9182f7c46359a074285b251aca195af3b2887cc79d0cede7cc0b7e7f95c7d70472f7d3981e50042390a546375c8c1f1734a24583e1f8066319e93802eda50f3fb22ab8d6dc3d2afd102b71b6c5c2f2c915b6c3fc55000000007f0000"], 0xf8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x9) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1}, &(0x7f000095dffc)=0x3db) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x3, 0xd, 0x2, 0x80000001, 0x0, 0x50, 0x5, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x7, 0xc, 0x2, 0x6, r6}, &(0x7f0000000180)=0x10) [ 260.441166][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 05:39:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f00000000c0)={0x0, {0x93, 0x3ff}}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r1, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) open$dir(0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x5caad999, 0x600, 0x0, 0x362) [ 260.539102][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.626119][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.699971][ T9471] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 260.837589][ T9471] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 05:39:31 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6(0xa, 0x10000000000001, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="01010000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x7, &(0x7f0000000340)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x1, 'lblcr\x00', 0x8}, 0x2c) [ 260.920399][ T9685] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 260.977908][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 261.016114][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.024590][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.096335][ C0] hrtimer: interrupt took 54431 ns [ 261.191484][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 05:39:32 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6(0xa, 0x10000000000001, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="01010000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x7, &(0x7f0000000340)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x1, 'lblcr\x00', 0x8}, 0x2c) [ 261.278729][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.347759][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.388710][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.429656][ T9474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.476021][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 261.547146][ T9476] 8021q: adding VLAN 0 to HW filter on device team0 [ 261.582111][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.591305][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 05:39:32 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6(0xa, 0x10000000000001, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="01010000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x7, &(0x7f0000000340)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x1, 'lblcr\x00', 0x8}, 0x2c) [ 261.669610][ T9474] 8021q: adding VLAN 0 to HW filter on device team0 [ 261.792595][ T9471] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 261.840233][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 261.850910][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 05:39:32 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet6(0xa, 0x10000000000001, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="01010000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x7, &(0x7f0000000340)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x1, 'lblcr\x00', 0x8}, 0x2c) [ 261.886984][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.922196][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.958569][ T3515] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.965767][ T3515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.004025][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.039007][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.067020][ T3515] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.074201][ T3515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.178293][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.189250][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.241587][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.260186][ T9523] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.267357][ T9523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.288661][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.297673][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.306568][ T9523] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.313643][ T9523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.321866][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 262.346168][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 262.365817][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 262.374724][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 262.399710][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 262.410556][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 262.424886][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.452334][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.461110][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 262.470750][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 262.483164][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 262.493314][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 262.502274][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 262.511410][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.520050][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.528611][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.542325][ T9476] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 262.556630][ T9476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 262.582542][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 262.590598][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 262.599232][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.609149][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.617858][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.635532][ T9474] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 262.647879][ T9474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 262.668031][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 262.677145][ T9523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.692878][ T9494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.732795][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.752100][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.762212][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 262.770160][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.781349][ T9494] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.800332][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 262.808830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.817248][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.826454][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.834906][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.842057][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.853723][ T9476] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 262.866478][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.876800][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.885910][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.894525][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.901697][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.912286][ T9474] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 262.934497][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 262.947016][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 262.970924][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 05:39:33 executing program 2: keyctl$KEYCTL_RESTRICT_KEYRING(0x14, 0x0, &(0x7f0000000040)='asymmetric\x00', &(0x7f00000001c0)=@keyring={'key_or_keyring:'}) [ 262.987326][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.001382][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.016289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.046404][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 263.054292][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.071641][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.082909][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.094960][ T9530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.116325][ T9494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 263.262374][ T9494] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 263.291771][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 263.308634][ T3020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 05:39:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000040)) 05:39:34 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) r2 = getpid() waitid(0x2, r2, 0x0, 0x40000000, &(0x7f00000001c0)) r3 = socket(0x10, 0x80002, 0x0) close(r3) connect$tipc(r3, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) r4 = socket(0x10, 0x80002, 0x0) close(r4) connect$tipc(r4, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r4, &(0x7f0000000140), 0x492492492492805, 0x0) getpeername$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000140)=0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) prctl$PR_SET_PTRACER(0x59616d61, r5) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000100738d7a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cc1c8534000000000000000000000073797a310000000000000000000000000000000000000000cf0a000000000000000000000000000000000000000000000000000000000000000000000000000016000000000000000000000002000000000000003b38e967ac8206eaba86b97eec0b2bed1ee23364b10d6aad51020000e2a1db3c6a31e30dee4afc66d2442805400039389a804c41c2993fc67e8a146045e14e8a0800550e6a25c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b8838aa36ad24a7dce0973c362bd726a8ab11b0a0b00e77e6c16183cf47ce47302bdd311378eaab7372dab5eef84c31b3cad868a53e6f5e69746a7a0beda0686d2aa4d394286e5c81eae45e3a25b942b8da11edb578b453acab1d57f25833d4d4c13eef0e0e62be2015eedef3c32984c6c4b2b9c33d8a624cea95c3b3c6dd8735690f4786fc5166b0300"/527], 0x12e) r7 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r7, r6) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) write$UHID_INPUT2(r7, &(0x7f0000000080)={0xc, 0x8, "5c010a029edac130"}, 0xe) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) io_setup(0x0, &(0x7f0000000280)) [ 263.553180][ T3020] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max 05:39:34 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000700000025000000000100009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r1, 0x0, 0x12c, &(0x7f0000000140)='cgroup.stat\x00'}, 0x30) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000001c0)="f7", 0x1, r0}, 0x68) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) r5 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000040), 0xab) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000007c0)={0x3, 0x0, 0x15, &(0x7f0000000740)="87c40d9fe740a3a612f7cbbeb631c74c9e3c797e69"}) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000040), 0xab) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:39:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f00000000c0)={0x0, {0x93, 0x3ff}}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r1, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) open$dir(0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x5caad999, 0x600, 0x0, 0x362) 05:39:34 executing program 2: fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r3 = open(&(0x7f0000fedff8)='./file0\x00', 0x141042, 0x0) fstat(r3, &(0x7f0000000fbc)) sigaltstack(&(0x7f0000001000/0x1000)=nil, 0x0) 05:39:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) [ 263.603423][ T3020] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.02 Device [syz1] on sz1 05:39:34 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:34 executing program 4: r0 = perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000700000025000000000100009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 263.822958][ T26] audit: type=1400 audit(1574573974.702:48): avc: denied { prog_load } for pid=9793 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:39:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000080)) [ 263.901853][ T3020] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max [ 263.936611][ T2505] blk_update_request: I/O error, dev loop7, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 263.949064][ T2505] blk_update_request: I/O error, dev loop7, sector 256 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 263.979848][ T9800] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 264.016578][ T3020] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.02 Device [syz1] on sz1 [ 264.076405][ T2506] blk_update_request: I/O error, dev loop7, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.088576][ T9800] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 264.127921][ T9800] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 264.145026][ T26] audit: type=1400 audit(1574573975.032:49): avc: denied { prog_run } for pid=9809 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:39:35 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x73, 0x1) ioctl$USBDEVFS_GETDRIVER(r0, 0xc00c5512, &(0x7f0000000100)={0x0, "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"}) 05:39:35 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev+loop#\x00', 0x0, 0x10000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000017c0)) r2 = syz_open_dev$loop(&(0x7f0000001280)='/dev/loop#\x00', 0xea, 0x7f) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x387) getdents64(r3, &(0x7f0000001880)=""/4096, 0x1000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001400)='+pro\x00\x80\x00\x00l\'net/pFkey\x00', 0xf5c27c711e06a646, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000080)=""/11) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fchmod(r2, 0x800000100000064) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000003e80)=[{0x80000006, 0x2}]}, 0x10) setsockopt$sock_int(r5, 0x1, 0x1b, &(0x7f0000000140), 0x4) sendmmsg$inet(r4, &(0x7f0000001180), 0x0, 0x80) ioctl$VT_OPENQRY(r4, 0x5600, &(0x7f00000000c0)) r6 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r6, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) syz_open_dev$loop(&(0x7f0000001200)='\x00\x00\x00\x00\x00\xff\x00', 0x7, 0x100) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x7f) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x4882, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001440)='/dev/autofs\x00', 0x80080, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x7f) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r10, 0x4c03, &(0x7f00000017c0)) r11 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) connect$packet(r11, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) openat$autofs(0xffffffffffffff9c, &(0x7f0000001180)='/dev/autofs\x00', 0x80100, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r18, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r18, 0x0) r19 = dup2(r17, r18) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r19, 0x6, 0x1d, 0x0, &(0x7f0000000080)) ioctl$LOOP_GET_STATUS(r19, 0x4c03, &(0x7f0000001480)) r20 = memfd_create(&(0x7f0000001340)='!cgroupvmnet0em1\x00\xbd\xe7?\x8f\x17\'\xb3\x9bh1\'\f\x82\xaf\x89N\xd2\x1a\xe5\xa9\x06\x00\x00\x00\x00\x00\x00\x00P\xbb?\xb4\x92\xdd\xa0\x02\xc1\xac\xcb\xc7\xa4\x98iU\x18B\xc2\xa4\x84\xf5\x19\xa1O\xf0\x14\x02\xc7\xc5\xec8\x91\xb7\xea\xaf\xcd\xe2djj\x8d01\x02\x8f\x1e\xad\xd3\xc4x\xf3\xe3\t\xc2\x8bNh\x1c\xa7\xe8\xbc\xdd\x95\xd3K\xb8}\a\x82\xc0\x853\x88\xc0\xe2\xa4N\xeb|\x83Y}hx\b$/p\x1eMYT\x1b\x80\x90\x061\xdf\xcd\\!\x8cV\xa27\xde\x7f\xb8S\xf7\x05\xbfaQP\xf6\x0eao\x06', 0x0) connect$packet(r20, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) getdents64(r20, &(0x7f0000000180)=""/4096, 0x1000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x2000, 0x0) [ 264.187950][ T9800] UDF-fs: Scanning with blocksize 512 failed [ 264.212519][ T2505] blk_update_request: I/O error, dev loop7, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.230947][ T2505] blk_update_request: I/O error, dev loop7, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.243754][ T9800] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 264.294894][ T2505] blk_update_request: I/O error, dev loop7, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.306587][ T9800] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 05:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f00000004c0)=""/4096, &(0x7f0000000240)=0x1000) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x0, 0x0, @pic={0x81, 0xab, 0x6, 0x0, 0x2, 0x1, 0x0, 0xfb, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x8, 0x3f}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x4000000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x7d06ad7536c2636d) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:39:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 264.341005][ T9800] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 264.399818][ T9800] UDF-fs: Scanning with blocksize 1024 failed [ 264.433279][ T2505] blk_update_request: I/O error, dev loop7, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 05:39:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000040)=0x4) [ 264.458166][ T2505] blk_update_request: I/O error, dev loop7, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.470919][ T9800] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 264.490848][ T26] audit: type=1326 audit(1574573975.382:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9831 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 [ 264.557933][ T2505] blk_update_request: I/O error, dev loop7, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.569579][ T9800] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 264.621106][ T9800] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 264.634535][ T9800] UDF-fs: Scanning with blocksize 2048 failed [ 264.663241][ T26] audit: type=1400 audit(1574573975.552:51): avc: denied { map } for pid=9819 comm="syz-executor.2" path=2F6D656D66643AB3202864656C6574656429 dev="tmpfs" ino=31989 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 05:39:35 executing program 5: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000040)) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f000000a000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) [ 264.708864][ T2505] blk_update_request: I/O error, dev loop7, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.723846][ T9800] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 264.744761][ T9800] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 264.754978][ T9800] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 264.777719][ T9800] UDF-fs: Scanning with blocksize 4096 failed [ 264.784291][ T9800] UDF-fs: warning (device loop7): udf_fill_super: No partition found (1) [ 264.806266][ T9844] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 264.823048][ T9844] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 264.834505][ T9844] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 264.843053][ T9844] UDF-fs: Scanning with blocksize 512 failed [ 264.850169][ T9844] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 264.860290][ T9844] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 05:39:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff}, 0x20) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) syz_genetlink_get_family_id$tipc(0x0) 05:39:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_int(r0, 0x0, 0xc, 0x0, &(0x7f0000000040)) [ 264.870876][ T9844] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 264.878929][ T9844] UDF-fs: Scanning with blocksize 1024 failed [ 264.885814][ T9844] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 264.895962][ T9844] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 264.905628][ T9844] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 264.913364][ T9844] UDF-fs: Scanning with blocksize 2048 failed 05:39:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0), 0x10) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000004c0)=""/4096, &(0x7f0000000240)=0x1000) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x0, 0x0, @pic={0x81, 0xab, 0x6, 0x0, 0x2, 0x1, 0x0, 0xfb, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x8, 0x3f}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x4000000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x7d06ad7536c2636d) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:39:35 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) [ 264.926402][ T9844] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 264.937931][ T9844] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 264.947760][ T9844] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 264.955582][ T9844] UDF-fs: Scanning with blocksize 4096 failed [ 264.961669][ T9844] UDF-fs: warning (device loop7): udf_fill_super: No partition found (1) 05:39:36 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094440000000000000000000000050000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000005000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000edffffffffffffff00000003000000000000000000000000000000000000000000000000000000eeffffff00000000e2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000c4d300000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000080000000000000000000000000000000000000000000000000040ac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000404110061ca7c55a5e42d81d1e234c789375b23d36d0b7bd15e04e813cd723f47ce56dffa04c1f203e51942829b769c021a132a47ccf4ac88c150bfed88c8aa4db6efaf6839814663b22c44fc5c577657253c50de4d1797c8a8195d482f8537d4f9aeaf495c01d5a31348917325b55b4136f49a20b50d881350d03870439d9759097585033743069099a0c14b7ca9b9fdbba4b31e8658d38d801fc074013102247ae529fe94b9529742c76d1825a441f8205c765deabf008b3e6ac5064c0c2ca8030c651abbfe7fe8803ff6a2a5de91470a21ed3a29fbe853bf2625e00600d9e32fdac5c79c83d19c110c2cccfc32f7f99ea69994f81d903641120915cdcf49efeed42a2054e0544b5f53f43e4f7ab5b6037071e14229606aa0c3d7b7313232a904dbaedc6bd9fe7a1e54afc699624941b6c58fe24ca2338d97bbae7b60c350e72039f84328e39fdf444997aa080a882a81da917d4739bcbb223be6d19106fa4a239fa48a231a9786875523675a7058bc9135228354b3c161cd1c0d0e38d3e1514182f02f3a3a5273fa134e2756aee14acf52e878855b3c2d10bcc65caa785eb923078eebe9a92a0010fd0d9d4175cac3fa4c2ffa948ef6ace5b105904f91733855793c9e18e122e47a5cbf17b194016d3f938504c682a6e79af70f6028f13657100e36d31586511114091a8155a90889521a35f3997b6aa2e120fc6f1d8d38960e3659620e0c6192950e94000000000000000000000000000000003eb09ed9381be96996002d301735aa505e22a9336b362a1a28c3a0f70cc499152a43db91fa9e1569083a5d522702cd13ccba06629a50b3c11482cf9a948bcadbdae6da92f4d1a9b6bbea4b5faa8a9661ee1ccc6ef24efeafa4e233e36dfba0d7cba9be865b767c409cc5d90dfdd6ff9fe276fbf345b8af202eb993eb2548bdd841a4bb28e65b4125da980f6419f80eef639d7b90243b8fb9717755408f551411af115da7cf3e52d99a30bdc09d58cdbb55d997d51a57fb71a77b05ea854cb2675ab5"], 0x310) 05:39:36 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x80000) [ 265.134571][ T9861] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 265.160846][ T9861] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 05:39:36 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) close(r0) [ 265.211328][ T9861] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 265.219244][ T9861] UDF-fs: Scanning with blocksize 512 failed [ 265.241486][ T9861] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 265.276833][ T9861] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 265.297134][ T26] audit: type=1326 audit(1574573976.192:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9831 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 05:39:36 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000080)=""/171, 0x2d) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) 05:39:36 executing program 0: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000040)) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x0) [ 265.388708][ T9861] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 265.402628][ T9861] UDF-fs: Scanning with blocksize 1024 failed [ 265.411386][ T9861] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 265.421416][ T9861] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 265.431265][ T9861] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 265.439066][ T9861] UDF-fs: Scanning with blocksize 2048 failed [ 265.445969][ T9861] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 265.485886][ T9861] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 265.497809][ T9861] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 265.516624][ T9861] UDF-fs: Scanning with blocksize 4096 failed 05:39:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:36 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x4, &(0x7f0000000000)=""/28, 0x1c) 05:39:36 executing program 2: mkdir(&(0x7f0000000380)='./file2\x00', 0x90) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) link(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000200)='./bus/file1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000140)=0x1) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f00000001c0)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 265.523739][ T26] audit: type=1326 audit(1574573976.412:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9884 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 [ 265.524182][ T9861] UDF-fs: warning (device loop7): udf_fill_super: No partition found (1) 05:39:36 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) [ 265.698813][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 265.728074][ T9897] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 265.753711][ T9897] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 265.773579][ T26] audit: type=1400 audit(1574573976.662:54): avc: denied { syslog } for pid=9890 comm="syz-executor.0" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 05:39:36 executing program 1: [ 265.778668][ T9897] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 265.843905][ T9897] UDF-fs: Scanning with blocksize 512 failed [ 265.853539][ T9897] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 265.881484][ T9897] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 265.892041][ T9901] EXT4-fs (sda1): re-mounted. Opts: usrjquota=, [ 265.931080][ T9897] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 265.982261][ T9897] UDF-fs: Scanning with blocksize 1024 failed [ 266.000711][ T9897] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 266.014026][ T9897] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 05:39:36 executing program 1: 05:39:36 executing program 0: [ 266.031267][ T9897] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 266.071365][ T9897] UDF-fs: Scanning with blocksize 2048 failed [ 266.105359][ T9897] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 266.115375][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 266.121426][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 266.136830][ T9897] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 266.146757][ T9898] EXT4-fs (sda1): re-mounted. Opts: usrjquota=, 05:39:37 executing program 1: [ 266.195157][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 266.201047][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 266.201564][ T9897] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found 05:39:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:37 executing program 0: [ 266.258547][ T9897] UDF-fs: Scanning with blocksize 4096 failed [ 266.305377][ T9897] UDF-fs: warning (device loop7): udf_fill_super: No partition found (1) [ 266.319004][ T26] audit: type=1326 audit(1574573977.212:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9884 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 05:39:37 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000080)=""/171, 0x2d) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) 05:39:37 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:37 executing program 1: r0 = open(0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) add_key(&(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(0x0, 0x0, 0x0, 0xfffffc4d, r1) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000380)="21f5178e91084ac5a73a1d62bc4b7c0fa0bbd2c52d4e3070076d4671d7aa5b9ff8dad1f5f19523789a0c0e22f91fe762577dfdd7a0bab1ac34e4a52173af1b7e3ddbba5e89c426e7d4977b8d6ba8ff1f1ee09ff2de0a39c3e5458a53b815ed88f36e4c0cc4a258e2fafed6ed4b22b18eb23c9caa1cd2308ed3c31fd3b5343f91a265fc81f4af13df75b4ebbd54159be4a9e20e7cabac1a4e75bb77c60ed4969653dc4a4f967b10242f6c8ecc0d229c860987fea594d674646a95840f86c36079a733ba8e33e1d95474d71954611b596569350cd2a93cac8b888fe9c28c159b70232168a1", 0xe4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getpid() getresgid(0x0, &(0x7f00000001c0), &(0x7f0000000280)) getpid() clock_nanosleep(0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x0, 0x2c263740, 0x17bf056, 0x0, 0x0, 0x6}) r3 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r3, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x3) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000580)={0x1f, 0x0, {0x1b}, 0x1, 0x7}, 0xe) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 05:39:37 executing program 0: [ 266.574520][ T26] audit: type=1326 audit(1574573977.462:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9930 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0xffff0000 [ 266.633361][ T9929] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 266.663451][ T9929] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 266.676294][ T9923] EXT4-fs (sda1): re-mounted. Opts: usrjquota=, [ 266.715208][ T9929] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 266.723101][ T9929] UDF-fs: Scanning with blocksize 512 failed 05:39:37 executing program 2: 05:39:37 executing program 0: [ 266.766871][ T9929] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 266.801443][ T9929] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 05:39:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) [ 266.828818][ T9929] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 266.853799][ T9929] UDF-fs: Scanning with blocksize 1024 failed [ 266.894813][ T9929] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 266.933569][ T9929] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 05:39:37 executing program 2: 05:39:37 executing program 0: [ 266.990179][ T9929] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 267.035561][ T9929] UDF-fs: Scanning with blocksize 2048 failed [ 267.091447][ T9929] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 05:39:38 executing program 0: [ 267.146780][ T9948] EXT4-fs (sda1): re-mounted. Opts: usrjquota=, 05:39:38 executing program 2: [ 267.207877][ T9929] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 05:39:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) [ 267.320576][ T9929] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 267.388822][ T9929] UDF-fs: Scanning with blocksize 4096 failed 05:39:38 executing program 4: [ 267.436553][ T9929] UDF-fs: warning (device loop7): udf_fill_super: No partition found (1) [ 267.486330][ T9962] EXT4-fs (sda1): re-mounted. Opts: usrjquota=, 05:39:38 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:38 executing program 1: r0 = open(0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) add_key(&(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(0x0, 0x0, 0x0, 0xfffffc4d, r1) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000380)="21f5178e91084ac5a73a1d62bc4b7c0fa0bbd2c52d4e3070076d4671d7aa5b9ff8dad1f5f19523789a0c0e22f91fe762577dfdd7a0bab1ac34e4a52173af1b7e3ddbba5e89c426e7d4977b8d6ba8ff1f1ee09ff2de0a39c3e5458a53b815ed88f36e4c0cc4a258e2fafed6ed4b22b18eb23c9caa1cd2308ed3c31fd3b5343f91a265fc81f4af13df75b4ebbd54159be4a9e20e7cabac1a4e75bb77c60ed4969653dc4a4f967b10242f6c8ecc0d229c860987fea594d674646a95840f86c36079a733ba8e33e1d95474d71954611b596569350cd2a93cac8b888fe9c28c159b70232168a1", 0xe4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getpid() getresgid(0x0, &(0x7f00000001c0), &(0x7f0000000280)) getpid() clock_nanosleep(0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000480)={0x0, 0x2c263740, 0x17bf056, 0x0, 0x0, 0x6}) r3 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r3, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x3) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000580)={0x1f, 0x0, {0x1b}, 0x1, 0x7}, 0xe) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 05:39:38 executing program 2: 05:39:38 executing program 0: 05:39:38 executing program 4: 05:39:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) [ 267.723348][ T9973] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 05:39:38 executing program 2: 05:39:38 executing program 0: 05:39:38 executing program 4: [ 267.829756][ T9973] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 267.857842][ T9973] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 267.942143][ T9973] UDF-fs: Scanning with blocksize 512 failed 05:39:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:38 executing program 4: 05:39:38 executing program 2: [ 267.996210][ T9973] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 268.057330][ T9973] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 268.099326][ T9973] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 268.157502][ T9973] UDF-fs: Scanning with blocksize 1024 failed [ 268.209638][ T9973] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 268.234952][ T9973] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 268.245335][ T9973] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 268.253449][ T9973] UDF-fs: Scanning with blocksize 2048 failed [ 268.269688][ T9973] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=256, location=256 [ 268.380594][ T9973] UDF-fs: error (device loop7): udf_read_tagged: read failed, block=512, location=512 [ 268.395259][ T9973] UDF-fs: warning (device loop7): udf_load_vrs: No anchor found [ 268.441873][ T9973] UDF-fs: Scanning with blocksize 4096 failed [ 268.457717][ T9973] UDF-fs: warning (device loop7): udf_fill_super: No partition found (1) 05:39:39 executing program 3: mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:39 executing program 1: 05:39:39 executing program 0: 05:39:39 executing program 4: 05:39:39 executing program 2: 05:39:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:39 executing program 3: mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:39 executing program 4: 05:39:39 executing program 0: 05:39:39 executing program 3: mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:39 executing program 2: 05:39:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:39 executing program 4: 05:39:39 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000700000025000000000100009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r0, 0x0, 0x0, 0x0}, 0x30) 05:39:40 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9c0000002c0001f000"/20, @ANYRES32=r1, @ANYBLOB="2000000000000000210004000a00010072d54ae98b00e6006c00e9cf59c17eb7176b8153f71b0200400005003c00010003000000ffffffff03000000010400000100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b0000140003008afe8000000000000000000000003760f2d1000300fe8800df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6cac2d69486a2e104b89feb25cf4fde8ffdc3a4e0cc6567492ff7122e792bfd853a12a1dd92df35eecca61094fbb11f605be022094354c65"], 0x9c}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 05:39:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) setuid(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000004c0)=""/4096, &(0x7f0000000240)=0x1000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x0, 0x0, @pic={0x81, 0xab, 0x6, 0x0, 0x2, 0x1, 0x0, 0xfb, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x8, 0x3f}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x4000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, 0x0}, 0x7d06ad7536c2636d) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:39:40 executing program 3: mknod$loop(0x0, 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x100001400000010, 0x2, 0x0) write(r2, &(0x7f0000000000)="2400000031001f0014f9740701090400020007100800edff010000000800020000000000", 0x24) 05:39:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setuid(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x0, 0x0, @pic={0x81, 0xab, 0x6, 0x0, 0x2, 0x1, 0x0, 0xfb, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x8, 0x3f}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x4000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x7d06ad7536c2636d) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:39:40 executing program 3: mknod$loop(0x0, 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:40 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:40 executing program 3: mknod$loop(0x0, 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:40 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) r2 = getpid() waitid(0x2, r2, 0x0, 0x40000000, &(0x7f00000001c0)) r3 = socket(0x10, 0x80002, 0x0) close(r3) connect$tipc(r3, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492805, 0x0) r4 = socket(0x10, 0x80002, 0x0) close(r4) connect$tipc(r4, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r4, &(0x7f0000000140), 0x492492492492805, 0x0) getpeername$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000140)=0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) prctl$PR_SET_PTRACER(0x59616d61, r5) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/527], 0x12e) r7 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r7, r6) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) write$UHID_INPUT2(r7, &(0x7f0000000080)={0xc, 0x8, "5c010a029edac130"}, 0xe) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) io_setup(0x0, &(0x7f0000000280)) 05:39:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.swap.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00ed6c5ec5c37901"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast2, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) 05:39:40 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) [ 269.799461][ T3515] hid-generic 0000:0000:0000.0003: ignoring exceeding usage max [ 269.842513][ T2506] print_req_error: 62 callbacks suppressed [ 269.842527][ T2506] blk_update_request: I/O error, dev loop9, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 269.855150][ T2506] blk_update_request: I/O error, dev loop9, sector 256 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 269.882944][T10075] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 269.896092][ T3515] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.02 Device [syz1] on sz1 [ 269.926502][ T2505] blk_update_request: I/O error, dev loop9, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 05:39:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) [ 269.938535][T10075] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 269.979396][T10075] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found 05:39:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/dev_mcast\x00') ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f00000000c0)={{0x9, 0xfff, 0x1f, 0x400}, 'syz0\x00', 0x3c}) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x701, @link='broadcast-link\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) [ 270.048387][T10075] UDF-fs: Scanning with blocksize 512 failed 05:39:41 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.swap.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00ed6c5ec5c37901"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast2, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) [ 270.098318][ T2505] blk_update_request: I/O error, dev loop9, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.113527][ T2505] blk_update_request: I/O error, dev loop9, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.129785][T10075] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 270.174936][ T2505] blk_update_request: I/O error, dev loop9, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.188399][T10075] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 270.257537][T10075] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 270.277855][T10075] UDF-fs: Scanning with blocksize 1024 failed 05:39:41 executing program 5: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:41 executing program 1: syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$9p_unix(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x808400, &(0x7f0000000340)={'trans=unix,', {[{@aname={'aname', 0x3d, '/dev/media#\x00'}}, {@uname={'uname', 0x3d, 'wlan1em0'}}, {@access_client='access=client'}]}}) userfaultfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x2a95, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r1, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) sysfs$1(0x1, &(0x7f0000000080)='em1GPL\\\x00') sendmsg(0xffffffffffffffff, 0x0, 0x20004) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 05:39:41 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) [ 270.313550][ T2506] blk_update_request: I/O error, dev loop9, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.335745][ T2506] blk_update_request: I/O error, dev loop9, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.348947][T10075] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 270.392840][ T2506] blk_update_request: I/O error, dev loop9, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.405586][T10075] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 270.525000][T10075] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 270.584826][T10075] UDF-fs: Scanning with blocksize 2048 failed [ 270.597039][T10116] EXT4-fs (sda1): re-mounted. Opts: usrjquota=, [ 270.651464][ T2506] blk_update_request: I/O error, dev loop9, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.672773][T10075] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 270.696648][T10075] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 270.710622][T10075] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 270.718478][T10075] UDF-fs: Scanning with blocksize 4096 failed [ 270.724550][T10075] UDF-fs: warning (device loop9): udf_fill_super: No partition found (1) 05:39:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/dev_mcast\x00') ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f00000000c0)={{0x9, 0xfff, 0x1f, 0x400}, 'syz0\x00', 0x3c}) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x701, @link='broadcast-link\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) 05:39:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req={0xffff, 0x0, 0x0, 0xb9}, 0x10) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], 0x0, 0x2900}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000004c0)={"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"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8c}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:39:41 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:41 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:41 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:41 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:41 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) [ 271.036737][T10143] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 271.065745][T10143] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 271.082585][T10143] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found 05:39:42 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xb2, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() r1 = socket(0x10, 0x80002, 0x0) close(r1) connect$tipc(r1, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492805, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000000)=0x1a01000, 0x4) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) [ 271.130141][T10143] UDF-fs: Scanning with blocksize 512 failed 05:39:42 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:42 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, 0x0) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40000000) r3 = accept(r2, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r4, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r5, 0x0) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000001c0)={0x0, 0xffffffffffffff34, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x4, 0xffffffff, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0x40888}, 0x0) r7 = shmget(0x3, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_STAT(r7, 0xd, &(0x7f0000000080)=""/58) socket$alg(0x26, 0x5, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xff2d, &(0x7f00000000c0)={0x0}}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r9 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') [ 271.185226][T10143] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 271.195635][T10143] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 271.205391][T10143] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 271.213112][T10143] UDF-fs: Scanning with blocksize 1024 failed [ 271.268098][T10143] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 271.305894][T10143] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 271.345028][T10143] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 271.426912][T10143] UDF-fs: Scanning with blocksize 2048 failed [ 271.448479][T10143] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 271.459899][T10143] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 05:39:42 executing program 1: syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$9p_unix(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x808400, &(0x7f0000000340)={'trans=unix,', {[{@aname={'aname', 0x3d, '/dev/media#\x00'}}, {@uname={'uname', 0x3d, 'wlan1em0'}}, {@access_client='access=client'}]}}) userfaultfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x2a95, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r1, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) sysfs$1(0x1, &(0x7f0000000080)='em1GPL\\\x00') sendmsg(0xffffffffffffffff, 0x0, 0x20004) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 05:39:42 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:42 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', 0x0, &(0x7f0000000200)='udf\x00', 0x0, 0x0) [ 271.515252][T10143] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 271.535304][T10143] UDF-fs: Scanning with blocksize 4096 failed [ 271.587994][T10162] IPVS: ftp: loaded support on port[0] = 21 [ 271.601153][T10143] UDF-fs: warning (device loop9): udf_fill_super: No partition found (1) 05:39:42 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00/', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) r0 = shmget(0x0, 0x3000, 0x80, &(0x7f00000bb000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_STAT(r0, 0xd, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffc7b) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r1 = open(&(0x7f0000000200)='./file0\x00', 0x1080, 0x0) fchdir(r1) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x401}]) [ 271.656213][ T26] audit: type=1400 audit(1574573982.542:57): avc: denied { write } for pid=10160 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 05:39:42 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', 0x0, &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:42 executing program 5: open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:42 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:42 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', 0x0, &(0x7f0000000200)='udf\x00', 0x0, 0x0) [ 272.047893][T10187] Dev loop0: unable to read RDB block 4 [ 272.077246][T10187] loop0: unable to read partition table [ 272.084659][T10187] loop0: partition table beyond EOD, truncated [ 272.096841][T10187] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 05:39:43 executing program 5: open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) [ 272.322579][T10180] IPVS: ftp: loaded support on port[0] = 21 [ 272.335647][T10206] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 05:39:43 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 272.413090][T10206] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 272.455520][T10206] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 272.514343][T10206] UDF-fs: Scanning with blocksize 512 failed [ 272.576434][T10211] Dev loop0: unable to read RDB block 4 [ 272.582070][T10211] loop0: unable to read partition table [ 272.597908][T10206] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 272.625543][T10211] loop0: partition table beyond EOD, truncated [ 272.631843][T10206] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 272.647749][T10211] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 05:39:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) timer_delete(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x7, &(0x7f00000000c0)={&(0x7f0000000200)={0x44, r2, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}]}, 0x44}}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000180)={0x101, 0x6, 0x3ff, 0x1, 0x3, 0x1, 0x80, 0x1f, 0x2}) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9f1aaa26fc1c098f9109ef19784eff83a923e91ffa92a2c937cebbcb57670512fdb0fe7274df7fab137af6180ce6ac5e2b890e861080a27363b7d997a61a38", @ANYRES16, @ANYBLOB="200827bd7000fcdbdf25100000002c00020008000b00020000008402050000000100080004000600000008000d0001000000b10002004e20000008000500010000000800050003000000340002000800030002000000"], 0x3}}, 0x4000000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000340)=""/14, 0x0) recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x30d, 0x0, 0x0, 0x0, 0x37, @random="12940c47266e"}, 0x10) read$rfkill(0xffffffffffffffff, 0x0, 0xc) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) [ 272.689051][T10206] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 272.720015][T10206] UDF-fs: Scanning with blocksize 1024 failed [ 272.771078][T10206] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 272.848689][T10206] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 [ 272.939824][T10206] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 272.985706][T10206] UDF-fs: Scanning with blocksize 2048 failed [ 273.000584][T10228] IPVS: Unknown mcast interface: syzkaller1 [ 273.015826][T10206] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=256, location=256 [ 273.042551][T10206] UDF-fs: error (device loop9): udf_read_tagged: read failed, block=512, location=512 05:39:44 executing program 1: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, 0x0) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40000000) r3 = accept(r2, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r4, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r5, 0x0) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000001c0)={0x0, 0xffffffffffffff34, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x4, 0xffffffff, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0x40888}, 0x0) r7 = shmget(0x3, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_STAT(r7, 0xd, &(0x7f0000000080)=""/58) socket$alg(0x26, 0x5, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xff2d, &(0x7f00000000c0)={0x0}}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r9 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') 05:39:44 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00/', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) r0 = shmget(0x0, 0x3000, 0x80, &(0x7f00000bb000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_STAT(r0, 0xd, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffc7b) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r1 = open(&(0x7f0000000200)='./file0\x00', 0x1080, 0x0) fchdir(r1) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x401}]) 05:39:44 executing program 5: open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:44 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 05:39:44 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, 0x0) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40000000) r3 = accept(r2, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r4, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r5, 0x0) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000001c0)={0x0, 0xffffffffffffff34, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x4, 0xffffffff, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0x40888}, 0x0) r7 = shmget(0x3, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_STAT(r7, 0xd, &(0x7f0000000080)=""/58) socket$alg(0x26, 0x5, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xff2d, &(0x7f00000000c0)={0x0}}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r9 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') [ 273.087892][T10206] UDF-fs: warning (device loop9): udf_load_vrs: No anchor found [ 273.152298][T10206] UDF-fs: Scanning with blocksize 4096 failed [ 273.199255][T10206] UDF-fs: warning (device loop9): udf_fill_super: No partition found (1) 05:39:44 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 05:39:44 executing program 5: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) [ 273.372410][T10251] IPVS: ftp: loaded support on port[0] = 21 [ 273.409855][T10243] Dev loop0: unable to read RDB block 4 [ 273.447860][T10243] loop0: unable to read partition table [ 273.504125][T10243] loop0: partition table beyond EOD, truncated [ 273.511322][T10242] IPVS: ftp: loaded support on port[0] = 21 [ 273.573317][T10243] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 05:39:45 executing program 5: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@usrjquota='usrjquota='}]}) 05:39:45 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00/', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) r0 = shmget(0x0, 0x3000, 0x80, &(0x7f00000bb000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_STAT(r0, 0xd, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffc7b) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r1 = open(&(0x7f0000000200)='./file0\x00', 0x1080, 0x0) fchdir(r1) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000c76166845fb30cf0b3c2b337225aac2e0e8de339f16258c643e8d9f06cffca5fce0b275efd57ba157ca11e1ed4d674491c7e82996e4ba5ce15529551af9f1295f9b02f705d4253670c0e670eb05a01f9fa9c3e3d7e82bdeba1a09fad9c500d953060a505662f82259f8e98c132809a1140b5f8bf50ee419c364f755c086bd7a036e23382e17b40ec3c44ec1e3a1e4559fcabec954e97092bfc26ded33b96a4ba1fb6c0a2ffbf75607a31975a4d2d1423328d8155af55e31806b2a56fe9ad0854bda8cb7491421418b33c76825db31ac375974671e3e42da46ac66fb927f8f53b58d70e6ec2409e603d0939aabbb3b7d718dcfb97e0fa21e52c117ce5c90f3f0db1b7e72966a4255ea62b02000000000000004709885edc631a7f911def1d2d0a8db6a6bbb5ea6daef546cc6bf1aa88615a2703113f34142333c40a5c3fd28419c76b78dba08467dcd84917e2e1b0c1cafb1293bb88961f782c4f5633330bd5b4e0dd0d7770f7b6af382710136077f2721e01387577c50d1bb382fcf712c47eeda14f7173fa2cf3557eeec8ae35a6f0980e7de43718c72dac4607ab4c08d2c45caae1be494d74c9967d4ea9fcaa11c4d2c0143b3786"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x401}]) 05:39:45 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, 0x0) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40000000) r3 = accept(r2, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r4, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r5, 0x0) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f00000001c0)={0x0, 0xffffffffffffff34, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x4, 0xffffffff, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0x40888}, 0x0) r7 = shmget(0x3, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_STAT(r7, 0xd, &(0x7f0000000080)=""/58) socket$alg(0x26, 0x5, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xff2d, &(0x7f00000000c0)={0x0}}, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r9 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') 05:39:45 executing program 4: mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) 05:39:45 executing program 4: mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) [ 274.211521][T10235] ================================================================== [ 274.219970][T10235] BUG: KASAN: use-after-free in refcount_inc_not_zero_checked+0x81/0x200 [ 274.228396][T10235] Read of size 4 at addr ffff888099cef080 by task syz-executor.1/10235 [ 274.236629][T10235] [ 274.239027][T10235] CPU: 1 PID: 10235 Comm: syz-executor.1 Not tainted 5.4.0-rc8-syzkaller #0 [ 274.247821][T10235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.258074][T10235] Call Trace: [ 274.261441][T10235] dump_stack+0x197/0x210 [ 274.265768][T10235] ? refcount_inc_not_zero_checked+0x81/0x200 [ 274.271830][T10235] print_address_description.constprop.0.cold+0xd4/0x30b [ 274.278840][T10235] ? refcount_inc_not_zero_checked+0x81/0x200 [ 274.284914][T10235] ? refcount_inc_not_zero_checked+0x81/0x200 [ 274.290974][T10235] __kasan_report.cold+0x1b/0x41 [ 274.295902][T10235] ? refcount_inc_not_zero_checked+0x81/0x200 [ 274.301967][T10235] kasan_report+0x12/0x20 [ 274.306285][T10235] check_memory_region+0x134/0x1a0 [ 274.311388][T10235] __kasan_check_read+0x11/0x20 [ 274.316229][T10235] refcount_inc_not_zero_checked+0x81/0x200 [ 274.322115][T10235] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 274.328359][T10235] ? __kasan_check_write+0x14/0x20 [ 274.333471][T10235] refcount_inc_checked+0x17/0x70 [ 274.338577][T10235] nr_release+0x62/0x3e0 [ 274.342851][T10235] __sock_release+0xce/0x280 [ 274.347459][T10235] sock_close+0x1e/0x30 [ 274.351614][T10235] __fput+0x2ff/0x890 [ 274.355726][T10235] ? __sock_release+0x280/0x280 [ 274.360590][T10235] ____fput+0x16/0x20 [ 274.364562][T10235] task_work_run+0x145/0x1c0 [ 274.369152][T10235] exit_to_usermode_loop+0x316/0x380 [ 274.374432][T10235] do_syscall_64+0x65f/0x760 [ 274.379089][T10235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.385021][T10235] RIP: 0033:0x4141d1 [ 274.388909][T10235] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 274.408515][T10235] RSP: 002b:00007ffe451889d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 274.416920][T10235] RAX: 0000000000000000 RBX: 0000000000000009 RCX: 00000000004141d1 [ 274.424881][T10235] RDX: 0000000000000000 RSI: ffffffff874dc43a RDI: 0000000000000008 [ 274.432839][T10235] RBP: 0000000000000001 R08: ffffffff8134daca R09: 00000000f58e5ba8 [ 274.440797][T10235] R10: 00007ffe45188ab0 R11: 0000000000000293 R12: 000000000075c9a0 [ 274.448757][T10235] R13: 000000000075c9a0 R14: 00000000007621c8 R15: 000000000075bfd4 [ 274.456749][T10235] ? __phys_addr+0x1a/0x120 [ 274.461294][T10235] ? xas_find_marked+0xc6a/0xf20 [ 274.466217][T10235] [ 274.468565][T10235] Allocated by task 10254: [ 274.472969][T10235] save_stack+0x23/0x90 [ 274.477111][T10235] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 274.482728][T10235] kasan_kmalloc+0x9/0x10 [ 274.487041][T10235] __kmalloc+0x163/0x770 [ 274.491329][T10235] sk_prot_alloc+0x23a/0x310 [ 274.495906][T10235] sk_alloc+0x39/0xf70 [ 274.499963][T10235] nr_create+0xb9/0x5e0 [ 274.504140][T10235] __sock_create+0x3d8/0x730 [ 274.509002][T10235] __sys_socket+0x103/0x220 [ 274.513504][T10235] __x64_sys_socket+0x73/0xb0 [ 274.518186][T10235] do_syscall_64+0xfa/0x760 [ 274.522692][T10235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.528561][T10235] [ 274.530874][T10235] Freed by task 10235: [ 274.534959][T10235] save_stack+0x23/0x90 [ 274.539105][T10235] __kasan_slab_free+0x102/0x150 [ 274.544028][T10235] kasan_slab_free+0xe/0x10 [ 274.548533][T10235] kfree+0x10a/0x2c0 [ 274.552412][T10235] __sk_destruct+0x4aa/0x680 [ 274.556986][T10235] sk_destruct+0xd5/0x110 [ 274.561388][T10235] __sk_free+0xfb/0x360 [ 274.565532][T10235] sk_free+0x42/0x50 [ 274.569414][T10235] nr_release+0x356/0x3e0 [ 274.573728][T10235] __sock_release+0xce/0x280 [ 274.578301][T10235] sock_close+0x1e/0x30 [ 274.582442][T10235] __fput+0x2ff/0x890 [ 274.586420][T10235] ____fput+0x16/0x20 [ 274.590387][T10235] task_work_run+0x145/0x1c0 [ 274.594964][T10235] exit_to_usermode_loop+0x316/0x380 [ 274.600234][T10235] do_syscall_64+0x65f/0x760 [ 274.604812][T10235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.610685][T10235] [ 274.613006][T10235] The buggy address belongs to the object at ffff888099cef000 [ 274.613006][T10235] which belongs to the cache kmalloc-2k of size 2048 [ 274.627048][T10235] The buggy address is located 128 bytes inside of [ 274.627048][T10235] 2048-byte region [ffff888099cef000, ffff888099cef800) [ 274.640387][T10235] The buggy address belongs to the page: [ 274.646011][T10235] page:ffffea0002673bc0 refcount:1 mapcount:0 mapping:ffff8880aa400e00 index:0x0 [ 274.655105][T10235] raw: 01fffc0000000200 ffffea00025ca208 ffffea000287d608 ffff8880aa400e00 [ 274.663676][T10235] raw: 0000000000000000 ffff888099cef000 0000000100000001 0000000000000000 [ 274.672242][T10235] page dumped because: kasan: bad access detected [ 274.678635][T10235] [ 274.680947][T10235] Memory state around the buggy address: [ 274.686561][T10235] ffff888099ceef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 274.694607][T10235] ffff888099cef000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 274.702652][T10235] >ffff888099cef080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 274.710695][T10235] ^ [ 274.714749][T10235] ffff888099cef100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 274.723748][T10235] ffff888099cef180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 274.731790][T10235] ================================================================== [ 274.739850][T10235] Disabling lock debugging due to kernel taint [ 274.838541][T10290] IPVS: ftp: loaded support on port[0] = 21 [ 274.855684][T10235] Kernel panic - not syncing: panic_on_warn set ... [ 274.862325][T10235] CPU: 0 PID: 10235 Comm: syz-executor.1 Tainted: G B 5.4.0-rc8-syzkaller #0 [ 274.872512][T10235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.878602][T10290] kobject: 'lo' (0000000094697db9): kobject_add_internal: parent: 'net', set: 'devices' [ 274.882576][T10235] Call Trace: [ 274.895567][T10235] dump_stack+0x197/0x210 [ 274.899913][T10235] panic+0x2e3/0x75c [ 274.901521][T10290] kobject: 'lo' (0000000094697db9): kobject_uevent_env [ 274.903813][T10235] ? add_taint.cold+0x16/0x16 [ 274.903831][T10235] ? refcount_inc_not_zero_checked+0x81/0x200 [ 274.903855][T10235] ? preempt_schedule+0x4b/0x60 [ 274.913865][T10290] kobject: 'lo' (0000000094697db9): fill_kobj_path: path = '/devices/virtual/net/lo' [ 274.915355][T10235] ? ___preempt_schedule+0x16/0x20 [ 274.915370][T10235] ? trace_hardirqs_on+0x5e/0x240 [ 274.915388][T10235] ? refcount_inc_not_zero_checked+0x81/0x200 [ 274.915402][T10235] end_report+0x47/0x4f [ 274.915413][T10235] ? refcount_inc_not_zero_checked+0x81/0x200 [ 274.915425][T10235] __kasan_report.cold+0xe/0x41 [ 274.915441][T10235] ? refcount_inc_not_zero_checked+0x81/0x200 [ 274.915456][T10235] kasan_report+0x12/0x20 [ 274.915469][T10235] check_memory_region+0x134/0x1a0 [ 274.915486][T10235] __kasan_check_read+0x11/0x20 [ 274.934211][T10290] kobject: 'queues' (000000003ffc0764): kobject_add_internal: parent: 'lo', set: '' [ 274.935875][T10235] refcount_inc_not_zero_checked+0x81/0x200 [ 274.935892][T10235] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 274.935910][T10235] ? __kasan_check_write+0x14/0x20 [ 274.935925][T10235] refcount_inc_checked+0x17/0x70 [ 274.935940][T10235] nr_release+0x62/0x3e0 [ 274.935962][T10235] __sock_release+0xce/0x280 [ 274.941523][T10290] kobject: 'queues' (000000003ffc0764): kobject_uevent_env [ 274.946080][T10235] sock_close+0x1e/0x30 [ 274.946095][T10235] __fput+0x2ff/0x890 [ 274.946110][T10235] ? __sock_release+0x280/0x280 [ 274.946124][T10235] ____fput+0x16/0x20 [ 274.946139][T10235] task_work_run+0x145/0x1c0 [ 274.946160][T10235] exit_to_usermode_loop+0x316/0x380 [ 274.946176][T10235] do_syscall_64+0x65f/0x760 [ 274.946191][T10235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.946201][T10235] RIP: 0033:0x4141d1 [ 274.946215][T10235] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 274.946222][T10235] RSP: 002b:00007ffe451889d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 274.946234][T10235] RAX: 0000000000000000 RBX: 0000000000000009 RCX: 00000000004141d1 [ 274.946249][T10235] RDX: 0000000000000000 RSI: ffffffff874dc43a RDI: 0000000000000008 [ 275.120347][T10235] RBP: 0000000000000001 R08: ffffffff8134daca R09: 00000000f58e5ba8 [ 275.128322][T10235] R10: 00007ffe45188ab0 R11: 0000000000000293 R12: 000000000075c9a0 [ 275.136287][T10235] R13: 000000000075c9a0 R14: 00000000007621c8 R15: 000000000075bfd4 [ 275.144272][T10235] ? __phys_addr+0x1a/0x120 [ 275.148773][T10235] ? xas_find_marked+0xc6a/0xf20 [ 275.154591][T10235] Kernel Offset: disabled [ 275.158938][T10235] Rebooting in 86400 seconds..