[ 26.646422] audit: type=1800 audit(1540727560.403:27): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 26.681757] audit: type=1800 audit(1540727560.413:28): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 27.291088] audit: type=1800 audit(1540727561.123:29): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 27.310585] audit: type=1800 audit(1540727561.133:30): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.105' (ECDSA) to the list of known hosts. 2018/10/28 11:52:56 fuzzer started 2018/10/28 11:52:58 dialing manager at 10.128.0.26:37113 2018/10/28 11:52:58 syscalls: 1 2018/10/28 11:52:58 code coverage: enabled 2018/10/28 11:52:58 comparison tracing: enabled 2018/10/28 11:52:58 setuid sandbox: enabled 2018/10/28 11:52:58 namespace sandbox: enabled 2018/10/28 11:52:58 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/28 11:52:58 fault injection: enabled 2018/10/28 11:52:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/28 11:52:58 net packed injection: enabled 2018/10/28 11:52:58 net device setup: enabled 11:56:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') write$cgroup_int(r0, &(0x7f0000000040), 0x12) syzkaller login: [ 232.839280] IPVS: ftp: loaded support on port[0] = 21 11:56:06 executing program 1: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) unshare(0x8000000) [ 233.079206] IPVS: ftp: loaded support on port[0] = 21 11:56:07 executing program 2: eventfd2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000280)=0x9, 0x1ad) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) r4 = shmget$private(0x0, 0x200000, 0x40, &(0x7f0000591000/0x200000)=nil) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) write$P9_RSTAT(r1, &(0x7f0000000480)={0x5f, 0x7d, 0x1, {0x0, 0x58, 0x401, 0x1, {0x10, 0x0, 0x7}, 0x10000000, 0x3ff, 0x0, 0x7, 0x6, '-)}},]', 0x5, "ca75736572", 0x9, '}@wlan1R,', 0x11, 'vboxnet0wlan0eth0'}}, 0x5f) getgroups(0x1, &(0x7f0000000300)=[0xee01]) dup(r2) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000400)={{0x9, r5, r6, r7, 0x0, 0x100, 0x4b}, 0x1, 0x7, 0x9, 0x55}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e24, @broadcast}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r8 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r8, 0xc08c5335, &(0x7f0000000000)={0x0, 0x0, 0x5, 'queue1\x00'}) [ 233.532140] IPVS: ftp: loaded support on port[0] = 21 11:56:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000380)={0x2, 0x0, [0x4b564d02, 0xfff]}) [ 233.994388] IPVS: ftp: loaded support on port[0] = 21 11:56:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x8}}) [ 234.466955] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.492164] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.499659] device bridge_slave_0 entered promiscuous mode [ 234.569900] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.603145] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.624227] device bridge_slave_0 entered promiscuous mode [ 234.625591] IPVS: ftp: loaded support on port[0] = 21 [ 234.649077] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.666331] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.696412] device bridge_slave_1 entered promiscuous mode [ 234.790182] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.803522] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.810965] device bridge_slave_1 entered promiscuous mode [ 234.847448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:56:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 234.958840] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 234.985442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 235.135981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 235.273665] IPVS: ftp: loaded support on port[0] = 21 [ 235.407289] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.548611] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.606862] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.709496] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.736474] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.752916] device bridge_slave_0 entered promiscuous mode [ 235.764082] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.881429] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.908947] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.916784] device bridge_slave_1 entered promiscuous mode [ 235.948760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 235.980969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.077322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.130335] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.182873] team0: Port device team_slave_0 added [ 236.214427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.312096] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.334455] team0: Port device team_slave_0 added [ 236.340868] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.347649] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.355484] device bridge_slave_0 entered promiscuous mode [ 236.365410] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.381671] team0: Port device team_slave_1 added [ 236.444471] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.450896] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.461058] device bridge_slave_1 entered promiscuous mode [ 236.468344] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.483961] team0: Port device team_slave_1 added [ 236.491406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 236.514056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.542604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.623945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.637869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.657845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.709149] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.774017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.797557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.832349] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.841380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.854276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.885840] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.914525] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.943257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.952651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.993374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.000468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.012706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.043472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.060755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.085385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.119892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.180256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.196803] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.223151] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.230666] device bridge_slave_0 entered promiscuous mode [ 237.243330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 237.250927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.313623] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.374434] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.392379] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.399752] device bridge_slave_1 entered promiscuous mode [ 237.448201] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.532108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.614152] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.621594] team0: Port device team_slave_0 added [ 237.646113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.661507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.680567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.796688] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.806290] team0: Port device team_slave_1 added [ 237.839875] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.862669] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.870032] device bridge_slave_0 entered promiscuous mode [ 237.967095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.055730] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.063685] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.071151] device bridge_slave_1 entered promiscuous mode [ 238.090467] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.128505] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 238.143656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.154025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.198234] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.226646] team0: Port device team_slave_0 added [ 238.238986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.260147] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.312568] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.319903] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 238.362704] team0: Port device team_slave_1 added [ 238.368129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.388857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.421626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 238.446312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 238.462689] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.469864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.483295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.512609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.542468] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 238.551519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.567059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.580447] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.586993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.593972] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.600351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.636718] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.645402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.683804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.712754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.734821] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.741211] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.747939] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.754343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.767400] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.789465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.823592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.842426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.906338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.923435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.941572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.981299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.003238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.029074] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.076913] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.095099] team0: Port device team_slave_0 added [ 239.171232] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 239.216667] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.252657] team0: Port device team_slave_1 added [ 239.292306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 239.299191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.321305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 239.332233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.349885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.422631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 239.429571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.442868] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.471722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 239.501139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.552624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 239.562858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.570902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.740789] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 239.748708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.760499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.901669] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.919609] team0: Port device team_slave_0 added [ 240.045575] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.062664] team0: Port device team_slave_1 added [ 240.186764] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.193215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.199880] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.206307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.229160] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.251984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 240.258825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.272647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.341636] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.348080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.354797] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.361161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.383655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.412002] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 240.425755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.453318] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.530941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.552564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.563894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.692878] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.700078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.712564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.993583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.003014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.199941] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.206372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.213105] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.219485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.235866] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.026559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.120014] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.126451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.133228] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.139616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.159022] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 243.062363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.052235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.289737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.516692] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.789664] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.972920] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 244.979097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.987432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.316843] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.342441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.351322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.390187] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.731139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.751010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.813882] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.189344] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.255612] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.369162] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.613215] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.619411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.632558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.736692] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.747068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.757925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.889342] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.095904] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.190495] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.306465] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.327092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.342245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.366434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.695196] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.851440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.352373] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 248.358598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.366301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:56:22 executing program 1: r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 11:56:22 executing program 1: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={"73797a310000000000000000000000feffffff00000000000600000000000000000000000000000000000000000000000040000000000000000000b30c88c0971c400800"}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000200)={{}, 'syz1\x00'}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/50, 0x32}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000380), 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) [ 248.754258] input: syz1 as /devices/virtual/input/input5 11:56:22 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={r0}, &(0x7f0000000000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) [ 248.898847] 8021q: adding VLAN 0 to HW filter on device team0 11:56:22 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x18, r0, 0x313, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x4000) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x400000028, 0x7fff, 0x3f}, 0xe) 11:56:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000080)="17", 0x1}], 0x1) 11:56:23 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e1, &(0x7f0000000000)) 11:56:23 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240), &(0x7f0000000380)) 11:56:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x400448e3, &(0x7f0000000000)) [ 249.956459] hrtimer: interrupt took 33648 ns [ 249.984525] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 11:56:24 executing program 2: eventfd2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000280)=0x9, 0x1ad) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) r4 = shmget$private(0x0, 0x200000, 0x40, &(0x7f0000591000/0x200000)=nil) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) write$P9_RSTAT(r1, &(0x7f0000000480)={0x5f, 0x7d, 0x1, {0x0, 0x58, 0x401, 0x1, {0x10, 0x0, 0x7}, 0x10000000, 0x3ff, 0x0, 0x7, 0x6, '-)}},]', 0x5, "ca75736572", 0x9, '}@wlan1R,', 0x11, 'vboxnet0wlan0eth0'}}, 0x5f) getgroups(0x1, &(0x7f0000000300)=[0xee01]) dup(r2) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000400)={{0x9, r5, r6, r7, 0x0, 0x100, 0x4b}, 0x1, 0x7, 0x9, 0x55}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e24, @broadcast}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r8 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r8, 0xc08c5335, &(0x7f0000000000)={0x0, 0x0, 0x5, 'queue1\x00'}) 11:56:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={"73797a310000000000000000000000feffffff00000000000600000000000000000000000000000000000000000000000040000000000000000000b30c88c0971c400800"}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000200)={{}, 'syz1\x00'}) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) readv(0xffffffffffffffff, &(0x7f0000000380), 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) 11:56:24 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000200)='./bus\x00', 0x110000141042, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000000c0)=@dstopts, 0x8) ftruncate(r2, 0x10099b7) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 250.606278] syz-executor2 (7168) used greatest stack depth: 14072 bytes left [ 250.642883] input: syz1 as /devices/virtual/input/input7 [ 250.652539] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 251.198603] syz-executor2 (7210) used greatest stack depth: 14008 bytes left 11:56:25 executing program 5: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@rand_addr, @in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x2, 0xffff, 0xfff, 0xfff}]}, 0x10) write(r0, &(0x7f00000003c0)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2c, 0x4, 0x0, {0x0, 0x0, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) sendfile(r0, r0, &(0x7f0000000080), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0xffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{}]}, 0x10) 11:56:25 executing program 3: mknod(&(0x7f0000000100)='./file0\x00', 0x1044, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x1, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r0, 0x7) close(r0) 11:56:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x8}}) 11:56:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2027}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x800, 0x0) ioctl$sock_ifreq(r0, 0x4000000000008927, &(0x7f0000000700)={"65716c000000a95b00", @ifru_ivalue=0x62}) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 11:56:25 executing program 1: eventfd2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000280)=0x9, 0x1ad) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) r4 = shmget$private(0x0, 0x200000, 0x40, &(0x7f0000591000/0x200000)=nil) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) write$P9_RSTAT(r1, &(0x7f0000000480)={0x5f, 0x7d, 0x1, {0x0, 0x58, 0x401, 0x1, {0x10, 0x0, 0x7}, 0x10000000, 0x3ff, 0x0, 0x7, 0x6, '-)}},]', 0x5, "ca75736572", 0x9, '}@wlan1R,', 0x11, 'vboxnet0wlan0eth0'}}, 0x5f) getgroups(0x1, &(0x7f0000000300)=[0xee01]) dup(r2) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000400)={{0x9, r5, r6, r7, 0x0, 0x100, 0x4b}, 0x1, 0x7, 0x9, 0x55}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e24, @broadcast}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r8 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r8, 0xc08c5335, &(0x7f0000000000)={0x0, 0x0, 0x5, 'queue1\x00'}) 11:56:25 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000000c0)=0x3d, 0x4) sendto$inet6(r1, &(0x7f0000000100)="020300000700000000000000fff55b4202938207d9fb3780398d537500000000", 0x20, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x3}, 0x1c) 11:56:25 executing program 0: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) [ 251.470962] ISOFS: Unable to identify CD-ROM format. 11:56:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x8}}) 11:56:25 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) ioctl$sock_bt_hci(r0, 0x400448e3, &(0x7f0000000000)) 11:56:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x80000000002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={"73797a310000000000000000000000feffffff00000000000600000000000000000000000000000000000000000000000040000000000000000000b30c88c0971c400800"}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000200)={{}, 'syz1\x00'}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/50, 0x32}], 0x1) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) [ 251.750767] ISOFS: Unable to identify CD-ROM format. 11:56:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f00000005c0)="660fd88e05000f01dfc7f80800baf80c66b8228c428b66efbafc0cb03aeebaf80c66b8145b478366efbafc0ced66b9800000c00f326635000100000f300f08660f380306f2000ff696006066b9250a00000f32", 0x53}], 0x1, 0x51, &(0x7f0000000140)=[@cr0={0x0, 0x40040000}], 0x1) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f00000000c0)="2e2e640fc7a80900fdb8e8038ee0f2e053baf80c66b820bbcb8866efbafc0c66b80000000066ef0f95610166b8150000000f23c80f21f86635000040000f23f8b800008ee8640f9a8803003d0000", 0x4e}], 0x129, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 251.808733] input: syz1 as /devices/virtual/input/input10 [ 251.914748] input: syz1 as /devices/virtual/input/input11 11:56:25 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={"73797a310000000000000000000000feffffff00000000000600000000000000000000000000000000000000000000000040000000000000000000b30c88c0971c400800"}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000200)={{}, 'syz1\x00'}) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 11:56:25 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000040)='wrr\x00', 0x0) ioctl$sock_bt_hci(r0, 0x400448e3, &(0x7f0000000000)) 11:56:25 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000080)=0xfffffffffffffffd) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000180)={[], 0x0, 0x200}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000440)={{{@in=@remote, @in, 0x4e23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, {0x6, 0x0, 0x3, 0x5c1, 0x1ff, 0x2, 0x400, 0x6}, {}, 0x1ff, 0x6e6bc0, 0x46f792e28205eb04, 0x1, 0x1}, {{@in=@multicast2, 0x4d4, 0x2b}, 0xa, @in6, 0x3506, 0x2, 0x0, 0x9, 0x99e, 0xffff, 0x1}}, 0xe8) [ 252.168062] input: syz1 as /devices/virtual/input/input12 11:56:26 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x99}, 0x10) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000000)) 11:56:26 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) fcntl$addseals(r0, 0x409, 0x8) [ 252.265483] ISOFS: Unable to identify CD-ROM format. 11:56:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x4}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}, 0x1c) 11:56:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020d2ec051000270fff8", 0x16}], 0x0, &(0x7f00000000c0)=ANY=[]) 11:56:26 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) set_robust_list(&(0x7f00000003c0)={&(0x7f0000000300)={&(0x7f00000002c0)}, 0x0, &(0x7f0000000380)={&(0x7f0000000340)}}, 0x18) 11:56:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) lstat(&(0x7f0000000280)='./file0/file1\x00', &(0x7f00000004c0)) 11:56:26 executing program 1: prctl$seccomp(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) unlink(&(0x7f0000000040)='./file0\x00') 11:56:26 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) [ 252.514957] FAT-fs (loop0): bogus sectors per cluster 13 11:56:26 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) write$binfmt_elf32(r0, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0xb2, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3}, [{0x3, 0x0, 0xb421, 0x0, 0x0, 0x100}], "", [[], []]}, 0x258) [ 252.572791] FAT-fs (loop0): Can't find a valid FAT filesystem 11:56:26 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x1000000400448cb, &(0x7f0000000000)) 11:56:26 executing program 1: [ 252.687439] FAT-fs (loop0): bogus sectors per cluster 13 [ 252.721534] FAT-fs (loop0): Can't find a valid FAT filesystem 11:56:26 executing program 3: 11:56:26 executing program 5: 11:56:26 executing program 1: [ 252.839712] ISOFS: Unable to identify CD-ROM format. 11:56:26 executing program 0: 11:56:26 executing program 4: 11:56:26 executing program 5: 11:56:26 executing program 3: 11:56:26 executing program 0: 11:56:27 executing program 5: 11:56:27 executing program 1: 11:56:27 executing program 4: 11:56:27 executing program 3: 11:56:27 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:27 executing program 0: 11:56:27 executing program 1: 11:56:27 executing program 4: 11:56:27 executing program 3: 11:56:27 executing program 5: 11:56:27 executing program 0: 11:56:27 executing program 1: 11:56:27 executing program 4: 11:56:27 executing program 5: 11:56:27 executing program 3: [ 253.525385] ISOFS: Unable to identify CD-ROM format. 11:56:27 executing program 0: 11:56:27 executing program 1: 11:56:27 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:27 executing program 0: 11:56:27 executing program 3: 11:56:27 executing program 5: 11:56:27 executing program 4: 11:56:27 executing program 1: 11:56:27 executing program 3: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={"73797a310000000000000000000000feffffff00000000000600000000000000000000000000000000000000000000000040000000000000000000b30c88c0971c400800", {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000200)={{}, 'syz1\x00'}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/50, 0x32}], 0x1) r1 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netdev_private(r1, 0x0, &(0x7f0000000d00)) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 11:56:27 executing program 4: 11:56:27 executing program 5: 11:56:27 executing program 0: [ 254.006956] input: syz1 as /devices/virtual/input/input14 11:56:27 executing program 5: 11:56:27 executing program 4: [ 254.117914] ISOFS: Unable to identify CD-ROM format. 11:56:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:28 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000000c0)=0x80000001) 11:56:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) 11:56:28 executing program 5: socketpair(0xf, 0x0, 0x0, &(0x7f0000002200)) 11:56:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @remote}, 0x10) 11:56:28 executing program 1: getrandom(&(0x7f0000000100)=""/4096, 0x1000, 0x0) [ 254.431315] ISOFS: Unable to identify CD-ROM format. 11:56:28 executing program 5: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffb) 11:56:28 executing program 0: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000000)) 11:56:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00003fdff5)={@multicast2, @loopback, @rand_addr}, 0xc) 11:56:28 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xf3) 11:56:28 executing program 3: sched_rr_get_interval(0x0, &(0x7f00000021c0)) 11:56:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:28 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000240)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402") 11:56:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000b1d000)='.', 0x2) 11:56:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, &(0x7f0000000180), 0x100000001) 11:56:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, {0x2, 0x4e23, @multicast1}, 0x24, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7f80000000000}) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2a00) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x35c) [ 254.999284] ISOFS: Unable to identify CD-ROM format. 11:56:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0xfffffffffffffffe, {0x2, 0x200, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27, 0x0, 0x20}) 11:56:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}, 0x27}) [ 255.039532] sysfs: Unknown parameter 'sysfs' 11:56:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'bcsf0\x00', 0x1000}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 11:56:29 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:29 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) chdir(&(0x7f0000000040)='./file0/../file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 11:56:29 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/23) 11:56:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r0) 11:56:29 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 11:56:29 executing program 1: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000600)={'\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}}) r3 = dup(r0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) r5 = socket(0x0, 0x0, 0xff) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x1c) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000680)={@empty, @empty, @mcast2, 0x4, 0x3, 0x1, 0x100, 0x2, 0x40089}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/42) sendfile(r3, r4, &(0x7f0000000500), 0xb) sendmsg$nl_generic(r3, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000700)={0x54, 0x41, 0x200, 0x70bd2c, 0x25dfdbfd, {0x14}, [@nested={0x40, 0x6, [@generic="36a685b68d90a87340730d6c2c7d4e01a9047b67777d80993ba5ab29ca16a093c1ba25806ef545e16e175f22277e07c10077b1105c8185f40c"]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x40080) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000bc0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000d00)={&(0x7f0000000b80), 0xc, &(0x7f0000000cc0)={&(0x7f0000000c00)={0xb4, r8, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff9f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xef5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}]}, 0xb4}}, 0x20000050) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r1) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0xe) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000d40)={@empty, 0x21, r6}) fchown(r4, r7, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) [ 255.405634] ISOFS: Unable to identify CD-ROM format. 11:56:29 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)=""/135) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x70}}, 0x0) 11:56:29 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/230) 11:56:29 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:29 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x70}}, 0x0) 11:56:29 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x70}}, 0x0) 11:56:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000100)={0x0, 0x0, 0x80000000}) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @local}, 0xc) 11:56:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 255.723561] ISOFS: Unable to identify CD-ROM format. 11:56:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 11:56:29 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 11:56:29 executing program 4: clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x0, 0x0, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000280)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f0000000140)={0x50f, 0x0, 0x10000, 0x81}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40086436, &(0x7f0000000240)={r3}) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:auditd_unit_file_t:s0\x00', 0x28, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) 11:56:29 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) [ 256.178918] ISOFS: Unable to identify CD-ROM format. 11:56:30 executing program 1: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000600)={'\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}}) r3 = dup(r0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) r5 = socket(0x0, 0x0, 0xff) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x1c) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000680)={@empty, @empty, @mcast2, 0x4, 0x3, 0x1, 0x100, 0x2, 0x40089}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/42) sendfile(r3, r4, &(0x7f0000000500), 0xb) sendmsg$nl_generic(r3, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000700)={0x54, 0x41, 0x200, 0x70bd2c, 0x25dfdbfd, {0x14}, [@nested={0x40, 0x6, [@generic="36a685b68d90a87340730d6c2c7d4e01a9047b67777d80993ba5ab29ca16a093c1ba25806ef545e16e175f22277e07c10077b1105c8185f40c"]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x40080) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000bc0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000d00)={&(0x7f0000000b80), 0xc, &(0x7f0000000cc0)={&(0x7f0000000c00)={0xb4, r8, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff9f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xef5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}]}, 0xb4}}, 0x20000050) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r1) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0xe) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000d40)={@empty, 0x21, r6}) fchown(r4, r7, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) 11:56:30 executing program 5: r0 = userfaultfd(0x80000) fsetxattr$security_evm(r0, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="025d752e503547d59b5760"], 0x1, 0x2) r1 = memfd_create(&(0x7f0000000040)='ramfs\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000580)=0xc) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000005c0)=[0x0, 0xee00, 0xee01, 0xee01, 0x0, 0xee01, 0xee00, 0x0]) chdir(&(0x7f0000000300)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10000, 0x8) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000740)={0x67, @rand_addr, 0x4e24, 0x4, 'ovf\x00', 0x28}, 0xfffffffffffffd76) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3}}, 0x1e) fchownat(r4, &(0x7f0000000440)='./file0\x00', r2, r3, 0x1400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380), &(0x7f0000000ac0)=[&(0x7f0000000b40)='ramfs\x00']) 11:56:30 executing program 3: socket$unix(0x1, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000500)='\x00', &(0x7f0000000740)=[&(0x7f00000003c0)='ip6_vti0\x00', &(0x7f0000000400), &(0x7f0000000480)='ip6_vti0\x00', &(0x7f0000000600)='team0\x00', &(0x7f0000000640)='/dev/adsp#\x00', &(0x7f0000000680)='/dev/adsp#\x00', &(0x7f00000006c0)='/dev/adsp#\x00', &(0x7f0000000700)='vmnet0security$\x00'], &(0x7f0000000980)=[&(0x7f0000000780)='ip6_vti0\x00', &(0x7f00000007c0)='ip6_vti0\x00', &(0x7f0000000800)="73020000000000000000", &(0x7f0000000840)='\'\x00', &(0x7f0000000880)="b02a7b405b76626f786e65743000", &(0x7f00000008c0)='systemem0\x00', &(0x7f0000000900)='\x00', &(0x7f0000000940)='team0\x00'], 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket(0x7, 0x80000, 0x10000000000401) sendmsg$inet_sctp(r2, &(0x7f0000000340)={&(0x7f0000000200)=@in={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x24000010}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) r3 = getpgrp(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0xfffffffffffffffc, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x12) r6 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80000001, 0xfffffffffffffffd) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000001700)={'team0\x00'}) sendmmsg(r5, &(0x7f0000009840)=[{{&(0x7f0000008500)=@nfc_llcp={0x27, 0x1, 0x1, 0x6, 0x4000, 0x3f, "e82705657ab6093a37364b6ea53af7335ab36d79c2b027a78a6d5f98a124251fd5082cd2bbcfc210b8eddfc5d1a296ec5d0929788156ac9bfcf4d2b55d6326", 0x20}, 0x80, &(0x7f0000008680), 0x0, &(0x7f00000086c0), 0x0, 0x1}, 0xffffffffffffffdc}], 0x1, 0x88c0) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x6, 0x0, 0x7, 0x3, 0x8, 0x4, 0x3, 0x2, 0x38f, 0x4, 0x40bcca1a, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r4, 0x0) r7 = inotify_init1(0x80003) fcntl$setown(r7, 0x8, 0xffffffffffffffff) ioctl$sock_proto_private(r6, 0x89e4, &(0x7f0000000500)="88057e23ac161c361d77a154619ecc1f2fcdfcb75333699416e619414a813607d9c9579932791a1b53a062c2f80336b4636b79b5a13759204dd0c39a9470502981417f9c60d5826243edd45eae69af323ec68c6cc0e8f5731119fd7903c5411342b9affe5ddae60a753d4f4321f0746f7286abee29af3b4b1deabc0d09372b4da2862fd02d7e137529300f40023d9b95958ed600505667bd9ed4be4e5ff7261dc14b712bd48d48464aa6c99d060321b213b2504517f65431e9d40d6f43bf4c8dddc8a0121542e70d0e3c485e32c77dcbfbd0de63e4bff40c83caeaccfcc71e9493f2a7") fcntl$getownex(r7, 0x10, &(0x7f00000004c0)={0x0, 0x0}) ptrace$setopts(0x4206, r8, 0x0, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/245, 0xf5) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x110, 0xffffffffffffffff, 0x24) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000440)={0x8, 0x0, 0x0, 0x1}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000180)) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000240)=ANY=[]}) 11:56:30 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000380)=0x40, 0x12) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0100"], 0x2) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2) keyctl$join(0x1, &(0x7f00000005c0)) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x20, 0x880) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000740)={@ethernet={0x0, @dev={[], 0x16}}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0)={0xfffffffffffffffb, 0x6, 0x9, 0x3, 0x20, 0x4, 0x20, 0x80000001, 0x7, 0x0, 0x7}, 0xb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000800)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_settime(r3, 0x1, &(0x7f0000000240)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x14) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3, 0x94) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2, 0x0) 11:56:30 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015002}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x10f, 0x0, 0x2, 0x2ee, 0x0, 0x0, 0x283}, "", [[], []]}, 0x220) 11:56:30 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x70}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) [ 256.744373] ISOFS: Unable to identify CD-ROM format. 11:56:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x40) ioctl(r0, 0x8912, &(0x7f00000002c0)="153f6234488dd25d766070") socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x400300, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143}, 0x28) 11:56:31 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@check_strict='check=strict'}, {@utf8='utf8'}]}) 11:56:31 executing program 5: mkdir(&(0x7f0000000280)='./file1\x00', 0x0) r0 = open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00') r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000080)='./file1\x00', 0x0) [ 257.212489] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 257.219486] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 257.243625] ODEBUG: object 0000000086fdd1da is on stack 0000000054480713, but NOT annotated. [ 257.245828] kobject: 'loop0' (00000000bcbf2329): kobject_uevent_env [ 257.258968] kobject: 'loop0' (00000000bcbf2329): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 257.261211] WARNING: CPU: 0 PID: 7663 at lib/debugobjects.c:369 __debug_object_init.cold.14+0x51/0xdf [ 257.279651] Kernel panic - not syncing: panic_on_warn set ... [ 257.285579] CPU: 0 PID: 7663 Comm: syz-executor4 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 257.293979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.303330] Call Trace: [ 257.305934] dump_stack+0x244/0x39d [ 257.309590] ? dump_stack_print_info.cold.1+0x20/0x20 [ 257.314793] panic+0x2ad/0x55c [ 257.317996] ? add_taint.cold.5+0x16/0x16 [ 257.322157] ? __warn.cold.8+0x5/0x45 [ 257.325995] ? __debug_object_init.cold.14+0x51/0xdf [ 257.331103] __warn.cold.8+0x20/0x45 [ 257.334837] ? __debug_object_init.cold.14+0x51/0xdf [ 257.339954] report_bug+0x254/0x2d0 [ 257.343607] do_error_trap+0x11b/0x200 [ 257.347509] do_invalid_op+0x36/0x40 [ 257.351239] ? __debug_object_init.cold.14+0x51/0xdf [ 257.356359] invalid_op+0x14/0x20 [ 257.359823] RIP: 0010:__debug_object_init.cold.14+0x51/0xdf [ 257.365546] Code: ea 03 80 3c 02 00 75 7c 49 8b 54 24 18 48 89 de 48 c7 c7 c0 f1 40 88 4c 89 85 d0 fd ff ff e8 09 8c d1 fd 4c 8b 85 d0 fd ff ff <0f> 0b e9 09 d6 ff ff 41 83 c4 01 b8 ff ff 37 00 44 89 25 b7 4e 66 [ 257.384455] RSP: 0018:ffff88017fef7308 EFLAGS: 00010086 [ 257.389825] RAX: 0000000000000050 RBX: ffff88017fef7af8 RCX: ffffc9000a2b4000 [ 257.397097] RDX: 0000000000000000 RSI: ffffffff816585a5 RDI: 0000000000000005 [ 257.404369] RBP: ffff88017fef7560 R08: ffff8801bc9544a8 R09: fffffbfff1272098 [ 257.411649] R10: fffffbfff1272098 R11: ffffffff893904c3 R12: ffff88017fcee540 [ 257.418916] R13: 00000000000d7640 R14: ffff88017fcee540 R15: ffff8801bc954498 [ 257.426209] ? vprintk_func+0x85/0x181 [ 257.430105] ? __debug_object_init.cold.14+0x4a/0xdf [ 257.435219] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 257.439808] ? debug_object_free+0x690/0x690 [ 257.444224] ? unwind_get_return_address+0x61/0xa0 [ 257.449160] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 257.454271] ? depot_save_stack+0x292/0x470 [ 257.458599] ? save_stack+0xa9/0xd0 [ 257.462229] ? save_stack+0x43/0xd0 [ 257.465849] ? kasan_kmalloc+0xc7/0xe0 [ 257.469741] ? bpf_test_init.isra.10+0x98/0x100 [ 257.474414] ? zap_class+0x640/0x640 [ 257.478127] ? do_syscall_64+0x1b9/0x820 [ 257.482195] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.487574] ? find_held_lock+0x36/0x1c0 [ 257.491643] debug_object_init+0x16/0x20 [ 257.495705] init_timer_key+0xa9/0x480 [ 257.499605] ? init_timer_on_stack_key+0xe0/0xe0 [ 257.504362] ? __might_fault+0x12b/0x1e0 [ 257.508424] ? __lockdep_init_map+0x105/0x590 [ 257.512920] ? __lockdep_init_map+0x105/0x590 [ 257.517433] ? lockdep_init_map+0x9/0x10 [ 257.521511] sock_init_data+0xe1/0xdc0 [ 257.525410] ? sk_stop_timer+0x50/0x50 [ 257.529321] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.534860] ? _copy_from_user+0xdf/0x150 [ 257.539011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.544553] ? bpf_test_init.isra.10+0x70/0x100 [ 257.549230] bpf_prog_test_run_skb+0x255/0xc40 [ 257.553818] ? __lock_acquire+0x62f/0x4c20 [ 257.558071] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 257.562918] ? __lock_acquire+0x62f/0x4c20 [ 257.567256] ? fput+0x130/0x1a0 [ 257.570544] ? __bpf_prog_get+0x9b/0x290 [ 257.574605] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 257.579444] bpf_prog_test_run+0x130/0x1a0 [ 257.583682] __x64_sys_bpf+0x3d8/0x510 [ 257.587571] ? bpf_prog_get+0x20/0x20 [ 257.591386] do_syscall_64+0x1b9/0x820 [ 257.595285] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.600652] ? syscall_return_slowpath+0x5e0/0x5e0 [ 257.605587] ? trace_hardirqs_on_caller+0x310/0x310 [ 257.610603] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 257.615621] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 257.622284] ? __switch_to_asm+0x40/0x70 [ 257.626345] ? __switch_to_asm+0x34/0x70 [ 257.630409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.635258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.640463] RIP: 0033:0x457569 [ 257.643693] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.662590] RSP: 002b:00007f8316289c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 257.670296] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 257.677566] RDX: 0000000000000028 RSI: 0000000020000400 RDI: 000000000000000a [ 257.684832] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 257.692110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f831628a6d4 [ 257.699375] R13: 00000000004bd892 R14: 00000000004cc208 R15: 00000000ffffffff [ 257.706844] [ 257.706852] ====================================================== [ 257.706859] WARNING: possible circular locking dependency detected [ 257.706864] 4.19.0-rc8-next-20181019+ #98 Not tainted [ 257.706870] ------------------------------------------------------ [ 257.706876] syz-executor4/7663 is trying to acquire lock: [ 257.706879] 00000000dc27c8c0 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 257.706895] [ 257.706899] but task is already holding lock: [ 257.706903] 000000004312f9e9 (&obj_hash[i].lock){-.-.}, at: __debug_object_init+0x127/0x1290 [ 257.706919] [ 257.706925] which lock already depends on the new lock. [ 257.706927] [ 257.706930] [ 257.706936] the existing dependency chain (in reverse order) is: [ 257.706938] [ 257.706941] -> #3 (&obj_hash[i].lock){-.-.}: [ 257.706956] _raw_spin_lock_irqsave+0x99/0xd0 [ 257.706961] __debug_object_init+0x127/0x1290 [ 257.706966] debug_object_init+0x16/0x20 [ 257.706970] hrtimer_init+0x97/0x490 [ 257.706975] init_dl_task_timer+0x1b/0x50 [ 257.706979] __sched_fork+0x2ae/0x590 [ 257.706983] init_idle+0x75/0x740 [ 257.706987] sched_init+0xb33/0xc02 [ 257.706992] start_kernel+0x4be/0xa2b [ 257.706997] x86_64_start_reservations+0x2e/0x30 [ 257.707013] x86_64_start_kernel+0x76/0x79 [ 257.707018] secondary_startup_64+0xa4/0xb0 [ 257.707020] [ 257.707023] -> #2 (&rq->lock){-.-.}: [ 257.707038] _raw_spin_lock+0x2d/0x40 [ 257.707043] task_fork_fair+0xb0/0x6d0 [ 257.707047] sched_fork+0x443/0xba0 [ 257.707052] copy_process+0x2585/0x8770 [ 257.707056] _do_fork+0x1cb/0x11c0 [ 257.707061] kernel_thread+0x34/0x40 [ 257.707065] rest_init+0x28/0x372 [ 257.707069] arch_call_rest_init+0xe/0x1b [ 257.707074] start_kernel+0x9f0/0xa2b [ 257.707079] x86_64_start_reservations+0x2e/0x30 [ 257.707084] x86_64_start_kernel+0x76/0x79 [ 257.707089] secondary_startup_64+0xa4/0xb0 [ 257.707092] [ 257.707094] -> #1 (&p->pi_lock){-.-.}: [ 257.707110] _raw_spin_lock_irqsave+0x99/0xd0 [ 257.707115] try_to_wake_up+0xd2/0x12e0 [ 257.707119] wake_up_process+0x10/0x20 [ 257.707124] __up.isra.1+0x1c0/0x2a0 [ 257.707128] up+0x13c/0x1c0 [ 257.707133] __up_console_sem+0xbe/0x1b0 [ 257.707138] console_unlock+0x80c/0x1190 [ 257.707142] vprintk_emit+0x391/0x990 [ 257.707147] vprintk_default+0x28/0x30 [ 257.707151] vprintk_func+0x7e/0x181 [ 257.707155] printk+0xa7/0xcf [ 257.707160] do_exit.cold.18+0x57/0x16f [ 257.707164] do_group_exit+0x177/0x440 [ 257.707169] __x64_sys_exit_group+0x3e/0x50 [ 257.707182] do_syscall_64+0x1b9/0x820 [ 257.707188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.707190] [ 257.707193] -> #0 ((console_sem).lock){-.-.}: [ 257.707213] lock_acquire+0x1ed/0x520 [ 257.707218] _raw_spin_lock_irqsave+0x99/0xd0 [ 257.707223] down_trylock+0x13/0x70 [ 257.707228] __down_trylock_console_sem+0xae/0x1f0 [ 257.707233] console_trylock+0x15/0xa0 [ 257.707237] vprintk_emit+0x372/0x990 [ 257.707242] vprintk_default+0x28/0x30 [ 257.707246] vprintk_func+0x7e/0x181 [ 257.707250] printk+0xa7/0xcf [ 257.707256] __debug_object_init.cold.14+0x4a/0xdf [ 257.707261] debug_object_init+0x16/0x20 [ 257.707265] init_timer_key+0xa9/0x480 [ 257.707270] sock_init_data+0xe1/0xdc0 [ 257.707275] bpf_prog_test_run_skb+0x255/0xc40 [ 257.707280] bpf_prog_test_run+0x130/0x1a0 [ 257.707284] __x64_sys_bpf+0x3d8/0x510 [ 257.707289] do_syscall_64+0x1b9/0x820 [ 257.707294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.707297] [ 257.707302] other info that might help us debug this: [ 257.707305] [ 257.707308] Chain exists of: [ 257.707311] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 257.707331] [ 257.707336] Possible unsafe locking scenario: [ 257.707338] [ 257.707343] CPU0 CPU1 [ 257.707348] ---- ---- [ 257.707351] lock(&obj_hash[i].lock); [ 257.707361] lock(&rq->lock); [ 257.707372] lock(&obj_hash[i].lock); [ 257.707381] lock((console_sem).lock); [ 257.707390] [ 257.707393] *** DEADLOCK *** [ 257.707396] [ 257.707401] 1 lock held by syz-executor4/7663: [ 257.707403] #0: 000000004312f9e9 (&obj_hash[i].lock){-.-.}, at: __debug_object_init+0x127/0x1290 [ 257.707423] [ 257.707426] stack backtrace: [ 257.707434] CPU: 0 PID: 7663 Comm: syz-executor4 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 257.707442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.707446] Call Trace: [ 257.707450] dump_stack+0x244/0x39d [ 257.707456] ? dump_stack_print_info.cold.1+0x20/0x20 [ 257.707460] ? vprintk_func+0x85/0x181 [ 257.707466] print_circular_bug.isra.35.cold.54+0x1bd/0x27d [ 257.707470] ? save_trace+0xe0/0x290 [ 257.707475] __lock_acquire+0x3399/0x4c20 [ 257.707479] ? mark_held_locks+0x130/0x130 [ 257.707484] ? put_dec+0xf0/0xf0 [ 257.707488] ? mark_held_locks+0x130/0x130 [ 257.707493] ? pointer_string+0x14e/0x1b0 [ 257.707497] ? number+0xca0/0xca0 [ 257.707502] ? print_usage_bug+0xc0/0xc0 [ 257.707506] ? ptr_to_id+0xd0/0x1d0 [ 257.707510] ? dentry_name+0x8f0/0x8f0 [ 257.707515] ? kasan_check_write+0x14/0x20 [ 257.707521] ? native_queued_spin_lock_slowpath+0x1ec/0x13d0 [ 257.707525] ? zap_class+0x640/0x640 [ 257.707531] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 257.707536] lock_acquire+0x1ed/0x520 [ 257.707540] ? down_trylock+0x13/0x70 [ 257.707545] ? lock_release+0xa10/0xa10 [ 257.707549] ? trace_hardirqs_off+0xb8/0x310 [ 257.707554] ? vprintk_emit+0x1de/0x990 [ 257.707559] ? trace_hardirqs_on+0x310/0x310 [ 257.707564] ? trace_hardirqs_off+0xb8/0x310 [ 257.707568] ? log_store+0x344/0x4c0 [ 257.707573] ? vprintk_emit+0x372/0x990 [ 257.707578] _raw_spin_lock_irqsave+0x99/0xd0 [ 257.707582] ? down_trylock+0x13/0x70 [ 257.707586] down_trylock+0x13/0x70 [ 257.707592] __down_trylock_console_sem+0xae/0x1f0 [ 257.707596] console_trylock+0x15/0xa0 [ 257.707601] vprintk_emit+0x372/0x990 [ 257.707605] ? wake_up_klogd+0x180/0x180 [ 257.707610] ? zap_class+0x640/0x640 [ 257.707614] ? print_usage_bug+0xc0/0xc0 [ 257.707619] ? find_held_lock+0x36/0x1c0 [ 257.707623] vprintk_default+0x28/0x30 [ 257.707628] vprintk_func+0x7e/0x181 [ 257.707631] printk+0xa7/0xcf [ 257.707648] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 257.707653] __debug_object_init.cold.14+0x4a/0xdf [ 257.707658] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 257.707675] ? debug_object_free+0x690/0x690 [ 257.707680] ? unwind_get_return_address+0x61/0xa0 [ 257.707685] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 257.707690] ? depot_save_stack+0x292/0x470 [ 257.707694] ? save_stack+0xa9/0xd0 [ 257.707699] ? save_stack+0x43/0xd0 [ 257.707703] ? kasan_kmalloc+0xc7/0xe0 [ 257.707707] ? bpf_test_init.isra.10+0x98/0x100 [ 257.707713] ? zap_class+0x640/0x640 [ 257.707717] ? do_syscall_64+0x1b9/0x820 [ 257.707723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.707727] ? find_held_lock+0x36/0x1c0 [ 257.707732] debug_object_init+0x16/0x20 [ 257.707736] init_timer_key+0xa9/0x480 [ 257.707741] ? init_timer_on_stack_key+0xe0/0xe0 [ 257.707758] ? __might_fault+0x12b/0x1e0 [ 257.707763] ? __lockdep_init_map+0x105/0x590 [ 257.707767] ? __lockdep_init_map+0x105/0x590 [ 257.707772] ? lockdep_init_map+0x9/0x10 [ 257.707776] sock_init_data+0xe1/0xdc0 [ 257.707780] ? sk_stop_timer+0x50/0x50 [ 257.707786] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.707790] ? _copy_from_user+0xdf/0x150 [ 257.707796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.707801] ? bpf_test_init.isra.10+0x70/0x100 [ 257.707805] bpf_prog_test_run_skb+0x255/0xc40 [ 257.707810] ? __lock_acquire+0x62f/0x4c20 [ 257.707815] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 257.707820] ? __lock_acquire+0x62f/0x4c20 [ 257.707824] ? fput+0x130/0x1a0 [ 257.707828] ? __bpf_prog_get+0x9b/0x290 [ 257.707833] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 257.707837] bpf_prog_test_run+0x130/0x1a0 [ 257.707842] __x64_sys_bpf+0x3d8/0x510 [ 257.707846] ? bpf_prog_get+0x20/0x20 [ 257.707850] do_syscall_64+0x1b9/0x820 [ 257.707856] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.707861] ? syscall_return_slowpath+0x5e0/0x5e0 [ 257.707866] ? trace_hardirqs_on_caller+0x310/0x310 [ 257.707871] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 257.707877] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 257.707881] ? __switch_to_asm+0x40/0x70 [ 257.707886] ? __switch_to_asm+0x34/0x70 [ 257.707891] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.707896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.707900] RIP: 0033:0x457569 [ 257.707915] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.707920] RSP: 002b:00007f8316289c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 257.707931] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 257.707938] RDX: 0000000000000028 RSI: 0000000020000400 RDI: 000000000000000a [ 257.707945] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 257.707951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f831628a6d4 [ 257.707958] R13: 00000000004bd892 R14: 00000000004cc208 R15: 00000000ffffffff [ 258.894504] Shutting down cpus with NMI [ 259.798673] Kernel Offset: disabled [ 259.802321] Rebooting in 86400 seconds..