ffffffffff, 0x406, 0xffffffffffffffff) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000300)) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r1, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 22:53:50 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x15, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:53:50 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 697.311095][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 697.316908][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:53:50 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000300)) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r1, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 22:53:50 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:50 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:50 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x16, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:53:50 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:50 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000300)) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r1, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 22:53:50 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:50 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 697.551126][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 697.557019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 697.638947][T29017] cgroup: fork rejected by pids controller in /syz3 22:53:53 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x17, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:53:53 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 0: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 0 (fault-call:1 fault-nth:0): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:53:53 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x18, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 700.559177][T29146] FAULT_INJECTION: forcing a failure. [ 700.559177][T29146] name failslab, interval 1, probability 0, space 0, times 1 [ 700.618502][T29146] CPU: 0 PID: 29146 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 700.626446][T29146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.636511][T29146] Call Trace: [ 700.639849][T29146] dump_stack+0x172/0x1f0 [ 700.644204][T29146] should_fail.cold+0xa/0x15 [ 700.648817][T29146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.654704][T29146] ? ___might_sleep+0x163/0x280 [ 700.659572][T29146] __should_failslab+0x121/0x190 [ 700.664535][T29146] should_failslab+0x9/0x14 [ 700.669059][T29146] __kmalloc_track_caller+0x2d8/0x740 [ 700.674446][T29146] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 700.680691][T29146] ? fput_many+0x12c/0x1a0 [ 700.685155][T29146] ? strndup_user+0x77/0xd0 [ 700.689673][T29146] memdup_user+0x26/0xb0 [ 700.693926][T29146] strndup_user+0x77/0xd0 [ 700.698282][T29146] ksys_mount+0x3c/0x150 [ 700.702551][T29146] __x64_sys_mount+0xbe/0x150 [ 700.711142][T29146] do_syscall_64+0x103/0x610 [ 700.719233][T29146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.725147][T29146] RIP: 0033:0x458209 [ 700.729049][T29146] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.748668][T29146] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 700.757517][T29146] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 22:53:53 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 700.765499][T29146] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 700.773476][T29146] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 700.781460][T29146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 700.789440][T29146] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:53:53 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:53 executing program 0 (fault-call:1 fault-nth:1): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:53:53 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x19, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 700.927893][T29277] FAULT_INJECTION: forcing a failure. [ 700.927893][T29277] name failslab, interval 1, probability 0, space 0, times 0 [ 700.944886][T29277] CPU: 1 PID: 29277 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 700.952814][T29277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.962884][T29277] Call Trace: [ 700.966195][T29277] dump_stack+0x172/0x1f0 [ 700.970551][T29277] should_fail.cold+0xa/0x15 [ 700.975516][T29277] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.981342][T29277] ? ___might_sleep+0x163/0x280 [ 700.986214][T29277] __should_failslab+0x121/0x190 [ 700.991170][T29277] should_failslab+0x9/0x14 [ 700.995690][T29277] __kmalloc_track_caller+0x2d8/0x740 [ 701.001076][T29277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.007349][T29277] ? strndup_user+0x77/0xd0 [ 701.011867][T29277] memdup_user+0x26/0xb0 [ 701.016120][T29277] strndup_user+0x77/0xd0 [ 701.020462][T29277] ksys_mount+0x7b/0x150 22:53:53 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x1a, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:53:53 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x1b, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 701.024720][T29277] __x64_sys_mount+0xbe/0x150 [ 701.029409][T29277] do_syscall_64+0x103/0x610 [ 701.034017][T29277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.039917][T29277] RIP: 0033:0x458209 [ 701.043825][T29277] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.063454][T29277] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:53:53 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 701.071882][T29277] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 701.079851][T29277] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 701.087832][T29277] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 701.096236][T29277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 701.104187][T29277] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 701.471138][ C0] net_ratelimit: 20 callbacks suppressed [ 701.471147][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 701.482591][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 701.711097][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 701.717130][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 701.791110][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 701.796892][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 702.681094][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.686902][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 702.831081][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 702.837009][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:53:56 executing program 4: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 0 (fault-call:1 fault-nth:2): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:53:56 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x1c, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:53:56 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 703.680160][T29597] FAULT_INJECTION: forcing a failure. [ 703.680160][T29597] name failslab, interval 1, probability 0, space 0, times 0 22:53:56 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 703.749602][T29597] CPU: 0 PID: 29597 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 703.758063][T29597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.768124][T29597] Call Trace: [ 703.771430][T29597] dump_stack+0x172/0x1f0 [ 703.775780][T29597] should_fail.cold+0xa/0x15 [ 703.780388][T29597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 703.786206][T29597] ? ___might_sleep+0x163/0x280 [ 703.791064][T29597] __should_failslab+0x121/0x190 [ 703.796007][T29597] should_failslab+0x9/0x14 [ 703.800517][T29597] kmem_cache_alloc+0x2b2/0x6f0 [ 703.805429][T29597] ? __might_fault+0x12b/0x1e0 [ 703.810240][T29597] getname_flags+0xd6/0x5b0 [ 703.814790][T29597] user_path_at_empty+0x2f/0x50 [ 703.819652][T29597] do_mount+0x150/0x2c40 [ 703.823911][T29597] ? copy_mount_string+0x40/0x40 [ 703.828857][T29597] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 703.828935][T29597] ? _copy_from_user+0xdd/0x150 [ 703.828957][T29597] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:53:56 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 4: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 703.828969][T29597] ? copy_mount_options+0x280/0x3a0 [ 703.828985][T29597] ksys_mount+0xdb/0x150 [ 703.829001][T29597] __x64_sys_mount+0xbe/0x150 [ 703.829019][T29597] do_syscall_64+0x103/0x610 [ 703.829042][T29597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.829054][T29597] RIP: 0033:0x458209 [ 703.829067][T29597] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:53:56 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x1d, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:53:56 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 703.829074][T29597] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 703.829086][T29597] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 703.829093][T29597] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 703.829110][T29597] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 703.851888][T29597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 703.851898][T29597] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:53:56 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 0 (fault-call:1 fault-nth:3): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:53:56 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 4: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:56 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:57 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:57 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x1e, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:53:57 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:57 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 704.185486][T29849] FAULT_INJECTION: forcing a failure. [ 704.185486][T29849] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 704.198843][T29849] CPU: 1 PID: 29849 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 704.206738][T29849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.216853][T29849] Call Trace: [ 704.220165][T29849] dump_stack+0x172/0x1f0 [ 704.224516][T29849] should_fail.cold+0xa/0x15 [ 704.229131][T29849] ? fault_create_debugfs_attr+0x1e0/0x1e0 22:53:57 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:57 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 704.234952][T29849] ? __lock_acquire+0x548/0x3fb0 [ 704.239900][T29849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.246157][T29849] should_fail_alloc_page+0x50/0x60 [ 704.251362][T29849] __alloc_pages_nodemask+0x1a1/0x7e0 [ 704.256748][T29849] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 704.262474][T29849] ? find_held_lock+0x35/0x130 [ 704.267252][T29849] ? do_syscall_64+0x103/0x610 [ 704.272036][T29849] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 704.277856][T29849] cache_grow_begin+0x9c/0x860 [ 704.282635][T29849] ? getname_flags+0xd6/0x5b0 [ 704.287326][T29849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 704.293583][T29849] kmem_cache_alloc+0x62d/0x6f0 [ 704.298453][T29849] getname_flags+0xd6/0x5b0 [ 704.302978][T29849] user_path_at_empty+0x2f/0x50 [ 704.307841][T29849] do_mount+0x150/0x2c40 [ 704.312098][T29849] ? copy_mount_string+0x40/0x40 [ 704.317050][T29849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 704.323311][T29849] ? _copy_from_user+0xdd/0x150 [ 704.328180][T29849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:53:57 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 704.331663][T29952] cgroup: fork rejected by pids controller in /syz5 [ 704.334427][T29849] ? copy_mount_options+0x280/0x3a0 [ 704.334448][T29849] ksys_mount+0xdb/0x150 [ 704.334466][T29849] __x64_sys_mount+0xbe/0x150 [ 704.334490][T29849] do_syscall_64+0x103/0x610 [ 704.359744][T29849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.365647][T29849] RIP: 0033:0x458209 [ 704.369551][T29849] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.389172][T29849] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 704.397600][T29849] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 704.405595][T29849] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 704.413583][T29849] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 704.421594][T29849] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 704.429567][T29849] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 704.442681][ T2488] print_req_error: 26 callbacks suppressed [ 704.442693][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 704.460198][ T2488] print_req_error: I/O error, dev loop0, sector 256 flags 0 [ 704.467818][T29849] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 704.477844][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 704.489220][T29849] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 704.498980][T29849] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 704.506908][T29849] UDF-fs: Scanning with blocksize 512 failed [ 704.517223][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 704.524755][ T2489] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 704.539008][T29849] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 704.555430][ T2489] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 704.563149][T29849] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 704.573436][T29849] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 704.581132][T29849] UDF-fs: Scanning with blocksize 1024 failed [ 704.587698][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 704.595210][ T2489] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 704.602994][T29849] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 704.616470][ T2488] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 704.624160][T29849] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 704.633867][T29849] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 704.641897][T29849] UDF-fs: Scanning with blocksize 2048 failed [ 704.648261][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 704.655799][T29849] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 704.669433][T29849] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 704.679053][T29849] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:53:57 executing program 0 (fault-call:1 fault-nth:4): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:53:57 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 704.686768][T29849] UDF-fs: Scanning with blocksize 4096 failed [ 704.692903][T29849] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 704.739036][T30075] FAULT_INJECTION: forcing a failure. [ 704.739036][T30075] name failslab, interval 1, probability 0, space 0, times 0 [ 704.752839][T30075] CPU: 1 PID: 30075 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 704.761226][T30075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.771294][T30075] Call Trace: [ 704.774599][T30075] dump_stack+0x172/0x1f0 [ 704.778944][T30075] should_fail.cold+0xa/0x15 [ 704.783537][T30075] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 704.789330][T30075] ? ___might_sleep+0x163/0x280 [ 704.794176][T30075] __should_failslab+0x121/0x190 [ 704.801102][T30075] should_failslab+0x9/0x14 [ 704.807066][T30075] kmem_cache_alloc_trace+0x2d1/0x760 [ 704.812428][T30075] alloc_fs_context+0x5a/0x640 [ 704.817320][T30075] fs_context_for_mount+0x25/0x30 [ 704.822417][T30075] do_mount+0x13d7/0x2c40 [ 704.826730][T30075] ? copy_mount_string+0x40/0x40 [ 704.831652][T30075] ? _copy_from_user+0xdd/0x150 [ 704.836487][T30075] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 704.842708][T30075] ? copy_mount_options+0x280/0x3a0 [ 704.847890][T30075] ksys_mount+0xdb/0x150 [ 704.852118][T30075] __x64_sys_mount+0xbe/0x150 [ 704.856781][T30075] do_syscall_64+0x103/0x610 [ 704.861405][T30075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.867289][T30075] RIP: 0033:0x458209 [ 704.871168][T30075] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.890759][T30075] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 704.899202][T30075] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 704.907173][T30075] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 704.915130][T30075] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 704.923101][T30075] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 704.931057][T30075] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 706.831106][ C0] net_ratelimit: 20 callbacks suppressed [ 706.831112][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 706.843781][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 706.991091][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 706.996909][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:53:59 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:59 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:59 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:59 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x21, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:53:59 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:53:59 executing program 0 (fault-call:1 fault-nth:5): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:00 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 707.150802][T30088] FAULT_INJECTION: forcing a failure. [ 707.150802][T30088] name failslab, interval 1, probability 0, space 0, times 0 [ 707.193509][T30088] CPU: 0 PID: 30088 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 707.202400][T30088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.212466][T30088] Call Trace: [ 707.215777][T30088] dump_stack+0x172/0x1f0 [ 707.220127][T30088] should_fail.cold+0xa/0x15 [ 707.224737][T30088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 707.230560][T30088] ? ___might_sleep+0x163/0x280 [ 707.235426][T30088] __should_failslab+0x121/0x190 [ 707.240377][T30088] should_failslab+0x9/0x14 [ 707.244893][T30088] kmem_cache_alloc_trace+0x2d1/0x760 [ 707.250271][T30088] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 707.256107][T30088] ? rcu_read_lock_sched_held+0x110/0x130 [ 707.261835][T30088] ? kmem_cache_alloc_trace+0x354/0x760 [ 707.267410][T30088] legacy_init_fs_context+0x48/0xe0 [ 707.272619][T30088] ? generic_parse_monolithic+0x200/0x200 [ 707.278387][T30088] alloc_fs_context+0x365/0x640 [ 707.283260][T30088] fs_context_for_mount+0x25/0x30 [ 707.288332][T30088] do_mount+0x13d7/0x2c40 [ 707.292688][T30088] ? copy_mount_string+0x40/0x40 [ 707.297644][T30088] ? _copy_from_user+0xdd/0x150 [ 707.302509][T30088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.308755][T30088] ? copy_mount_options+0x280/0x3a0 [ 707.313961][T30088] ksys_mount+0xdb/0x150 [ 707.318206][T30088] __x64_sys_mount+0xbe/0x150 [ 707.322895][T30088] do_syscall_64+0x103/0x610 [ 707.327498][T30088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.333402][T30088] RIP: 0033:0x458209 [ 707.337326][T30088] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 707.357059][T30088] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 707.365488][T30088] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 707.373470][T30088] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 707.381449][T30088] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:54:00 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:00 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:00 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x22, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:00 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:00 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 707.389427][T30088] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 707.397414][T30088] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 707.411188][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 707.417096][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 707.711120][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 707.716917][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 707.951121][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 707.956922][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:03 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:03 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:03 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x23, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:03 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:03 executing program 0 (fault-call:1 fault-nth:6): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:03 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:03 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:03 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 710.196167][T30325] FAULT_INJECTION: forcing a failure. [ 710.196167][T30325] name failslab, interval 1, probability 0, space 0, times 0 22:54:03 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 710.257150][T30325] CPU: 0 PID: 30325 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 710.265087][T30325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.275153][T30325] Call Trace: [ 710.278469][T30325] dump_stack+0x172/0x1f0 [ 710.282831][T30325] should_fail.cold+0xa/0x15 [ 710.287443][T30325] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 710.293272][T30325] ? ___might_sleep+0x163/0x280 [ 710.298152][T30325] __should_failslab+0x121/0x190 [ 710.303105][T30325] should_failslab+0x9/0x14 [ 710.307617][T30325] kmem_cache_alloc+0x2b2/0x6f0 [ 710.312469][T30325] ? fs_parse+0x57e/0xfc0 [ 710.312490][T30325] getname_kernel+0x53/0x370 [ 710.312506][T30325] kern_path+0x20/0x40 [ 710.312523][T30325] lookup_bdev.part.0+0x7b/0x1b0 [ 710.312536][T30325] ? blkdev_open+0x290/0x290 [ 710.312549][T30325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.312564][T30325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.312586][T30325] ? vfs_parse_fs_string+0x111/0x170 [ 710.352829][T30325] blkdev_get_by_path+0x81/0x130 22:54:03 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 710.357787][T30325] mount_bdev+0x5d/0x3c0 [ 710.362087][T30325] ? udf_load_vrs+0xc80/0xc80 [ 710.366778][T30325] ? vfs_parse_fs_string+0x116/0x170 [ 710.372164][T30325] udf_mount+0x35/0x40 [ 710.376246][T30325] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 710.381729][T30325] legacy_get_tree+0xf2/0x200 [ 710.386416][T30325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.392665][T30325] vfs_get_tree+0x123/0x450 [ 710.397177][T30325] do_mount+0x1436/0x2c40 [ 710.401521][T30325] ? copy_mount_string+0x40/0x40 22:54:03 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 710.406475][T30325] ? _copy_from_user+0xdd/0x150 [ 710.411345][T30325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 710.417595][T30325] ? copy_mount_options+0x280/0x3a0 [ 710.422806][T30325] ksys_mount+0xdb/0x150 [ 710.427060][T30325] __x64_sys_mount+0xbe/0x150 [ 710.431754][T30325] do_syscall_64+0x103/0x610 [ 710.436358][T30325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.442257][T30325] RIP: 0033:0x458209 22:54:03 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:03 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 710.446179][T30325] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 710.465802][T30325] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 710.474231][T30325] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 710.482207][T30325] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 710.490200][T30325] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 710.498174][T30325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:03 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 710.506151][T30325] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:03 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x24, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:03 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:03 executing program 0 (fault-call:1 fault-nth:7): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:03 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:03 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 22:54:03 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 710.703720][T30501] FAULT_INJECTION: forcing a failure. [ 710.703720][T30501] name failslab, interval 1, probability 0, space 0, times 0 [ 710.750303][T30501] CPU: 1 PID: 30501 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 710.759092][T30501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.769355][T30501] Call Trace: [ 710.772764][T30501] dump_stack+0x172/0x1f0 [ 710.777326][T30501] should_fail.cold+0xa/0x15 [ 710.781934][T30501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 710.787734][T30501] ? ___might_sleep+0x163/0x280 [ 710.792578][T30501] __should_failslab+0x121/0x190 [ 710.797539][T30501] should_failslab+0x9/0x14 [ 710.802251][T30501] kmem_cache_alloc_trace+0x2d1/0x760 [ 710.807620][T30501] ? kasan_check_write+0x14/0x20 [ 710.812565][T30501] ? lock_downgrade+0x880/0x880 [ 710.817584][T30501] alloc_super+0x55/0x890 [ 710.821918][T30501] ? kasan_check_read+0x11/0x20 [ 710.826767][T30501] ? test_single_super+0x10/0x10 [ 710.831886][T30501] sget_userns+0xf1/0x560 [ 710.836198][T30501] ? kill_litter_super+0x60/0x60 [ 710.841213][T30501] ? test_single_super+0x10/0x10 [ 710.846341][T30501] ? kill_litter_super+0x60/0x60 [ 710.851443][T30501] sget+0x10c/0x150 [ 710.855245][T30501] mount_bdev+0xff/0x3c0 [ 710.859483][T30501] ? udf_load_vrs+0xc80/0xc80 [ 710.864155][T30501] udf_mount+0x35/0x40 [ 710.868670][T30501] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 710.874146][T30501] legacy_get_tree+0xf2/0x200 [ 710.878834][T30501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.885347][T30501] vfs_get_tree+0x123/0x450 [ 710.889956][T30501] do_mount+0x1436/0x2c40 [ 710.894310][T30501] ? copy_mount_string+0x40/0x40 [ 710.899337][T30501] ? _copy_from_user+0xdd/0x150 [ 710.904205][T30501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 710.910444][T30501] ? copy_mount_options+0x280/0x3a0 [ 710.915636][T30501] ksys_mount+0xdb/0x150 [ 710.919871][T30501] __x64_sys_mount+0xbe/0x150 [ 710.924559][T30501] do_syscall_64+0x103/0x610 [ 710.929146][T30501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.935029][T30501] RIP: 0033:0x458209 [ 710.938910][T30501] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 710.958508][T30501] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 710.966913][T30501] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 710.974877][T30501] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 710.982853][T30501] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 710.990829][T30501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 710.998818][T30501] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 711.871112][ C0] net_ratelimit: 20 callbacks suppressed [ 711.871122][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 711.882667][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 712.111060][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 712.116880][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 712.191078][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 712.196905][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 713.071150][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 713.076993][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 713.231092][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 713.237057][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:06 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:06 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:06 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:06 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 22:54:06 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x25, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:06 executing program 0 (fault-call:1 fault-nth:8): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 713.342189][T30577] FAULT_INJECTION: forcing a failure. [ 713.342189][T30577] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 713.355643][T30577] CPU: 0 PID: 30577 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 713.363544][T30577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.373639][T30577] Call Trace: [ 713.376966][T30577] dump_stack+0x172/0x1f0 [ 713.381331][T30577] should_fail.cold+0xa/0x15 [ 713.385938][T30577] ? fault_create_debugfs_attr+0x1e0/0x1e0 22:54:06 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 713.391773][T30577] ? __lock_acquire+0x548/0x3fb0 [ 713.396731][T30577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.402991][T30577] should_fail_alloc_page+0x50/0x60 [ 713.408246][T30577] __alloc_pages_nodemask+0x1a1/0x7e0 [ 713.413693][T30577] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 713.419433][T30577] ? find_held_lock+0x35/0x130 [ 713.424223][T30577] ? __lock_acquire+0x548/0x3fb0 [ 713.429175][T30577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 713.435000][T30577] cache_grow_begin+0x9c/0x860 22:54:06 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 713.439778][T30577] ? getname_kernel+0x53/0x370 [ 713.444557][T30577] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.450812][T30577] kmem_cache_alloc+0x62d/0x6f0 [ 713.455683][T30577] getname_kernel+0x53/0x370 [ 713.460290][T30577] kern_path+0x20/0x40 [ 713.464400][T30577] lookup_bdev.part.0+0x7b/0x1b0 [ 713.469465][T30577] ? blkdev_open+0x290/0x290 [ 713.474066][T30577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.480335][T30577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.486605][T30577] ? vfs_parse_fs_string+0x111/0x170 22:54:06 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 22:54:06 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x26, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 713.491918][T30577] blkdev_get_by_path+0x81/0x130 [ 713.496874][T30577] mount_bdev+0x5d/0x3c0 [ 713.501125][T30577] ? udf_load_vrs+0xc80/0xc80 [ 713.505814][T30577] ? vfs_parse_fs_string+0x116/0x170 [ 713.511207][T30577] udf_mount+0x35/0x40 [ 713.515385][T30577] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 713.520882][T30577] legacy_get_tree+0xf2/0x200 [ 713.525662][T30577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.531943][T30577] vfs_get_tree+0x123/0x450 [ 713.536468][T30577] do_mount+0x1436/0x2c40 [ 713.540827][T30577] ? copy_mount_string+0x40/0x40 [ 713.545908][T30577] ? _copy_from_user+0xdd/0x150 [ 713.550807][T30577] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.557258][T30577] ? copy_mount_options+0x280/0x3a0 [ 713.562489][T30577] ksys_mount+0xdb/0x150 [ 713.566748][T30577] __x64_sys_mount+0xbe/0x150 [ 713.571451][T30577] do_syscall_64+0x103/0x610 [ 713.576176][T30577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.582271][T30577] RIP: 0033:0x458209 22:54:06 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 713.586315][T30577] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 713.606202][T30577] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 713.614638][T30577] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 713.622707][T30577] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 713.630690][T30577] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 713.638675][T30577] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 713.646671][T30577] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:06 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:06 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:06 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:06 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 22:54:06 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x27, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 713.723815][ T2488] print_req_error: 2 callbacks suppressed [ 713.723829][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 713.738120][ T2488] print_req_error: I/O error, dev loop0, sector 256 flags 0 [ 713.749999][T30577] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 713.766988][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 713.776094][T30577] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 713.837324][T30577] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 713.860449][T30577] UDF-fs: Scanning with blocksize 512 failed [ 713.870187][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 22:54:06 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 713.884857][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 713.893931][T30577] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 713.910662][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 713.937234][T30577] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 713.965231][T30577] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 713.996917][T30577] UDF-fs: Scanning with blocksize 1024 failed [ 714.004807][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 714.015397][ T2489] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 714.023258][T30577] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 714.036516][ T2488] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 714.044349][T30577] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 714.054030][T30577] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 714.061757][T30577] UDF-fs: Scanning with blocksize 2048 failed [ 714.068208][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 714.076210][T30577] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 714.087327][T30577] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:07 executing program 0 (fault-call:1 fault-nth:9): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:07 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 1: munmap(&(0x7f00003f9000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 22:54:07 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x28, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:07 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 714.097343][T30577] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 714.105437][T30577] UDF-fs: Scanning with blocksize 4096 failed [ 714.113763][T30577] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:07 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xc627159) unlink(&(0x7f0000000200)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 714.279670][T31067] FAULT_INJECTION: forcing a failure. [ 714.279670][T31067] name failslab, interval 1, probability 0, space 0, times 0 [ 714.320141][T31067] CPU: 0 PID: 31067 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 714.328092][T31067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.338246][T31067] Call Trace: [ 714.341567][T31067] dump_stack+0x172/0x1f0 [ 714.341630][T31067] should_fail.cold+0xa/0x15 [ 714.350548][T31067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 714.356375][T31067] ? ___might_sleep+0x163/0x280 [ 714.361247][T31067] __should_failslab+0x121/0x190 [ 714.366207][T31067] should_failslab+0x9/0x14 [ 714.370717][T31067] kmem_cache_alloc_trace+0x2d1/0x760 [ 714.376098][T31067] ? kasan_check_write+0x14/0x20 [ 714.381058][T31067] ? lock_downgrade+0x880/0x880 [ 714.385925][T31067] alloc_super+0x55/0x890 [ 714.390355][T31067] ? kasan_check_read+0x11/0x20 [ 714.395222][T31067] ? test_single_super+0x10/0x10 [ 714.400188][T31067] sget_userns+0xf1/0x560 [ 714.404552][T31067] ? kill_litter_super+0x60/0x60 [ 714.409507][T31067] ? test_single_super+0x10/0x10 [ 714.414449][T31067] ? kill_litter_super+0x60/0x60 22:54:07 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x29, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:07 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 714.419389][T31067] sget+0x10c/0x150 [ 714.423606][T31067] mount_bdev+0xff/0x3c0 [ 714.427859][T31067] ? udf_load_vrs+0xc80/0xc80 [ 714.432901][T31067] udf_mount+0x35/0x40 [ 714.436978][T31067] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 714.442446][T31067] legacy_get_tree+0xf2/0x200 [ 714.447227][T31067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.453662][T31067] vfs_get_tree+0x123/0x450 [ 714.458184][T31067] do_mount+0x1436/0x2c40 [ 714.462880][T31067] ? copy_mount_string+0x40/0x40 [ 714.467852][T31067] ? _copy_from_user+0xdd/0x150 [ 714.472724][T31067] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 714.478979][T31067] ? copy_mount_options+0x280/0x3a0 [ 714.484194][T31067] ksys_mount+0xdb/0x150 [ 714.488452][T31067] __x64_sys_mount+0xbe/0x150 [ 714.493234][T31067] do_syscall_64+0x103/0x610 [ 714.497857][T31067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.503758][T31067] RIP: 0033:0x458209 [ 714.507671][T31067] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 714.527548][T31067] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 714.536065][T31067] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 714.544080][T31067] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 714.552064][T31067] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 714.560045][T31067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 714.568031][T31067] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:07 executing program 0 (fault-call:1 fault-nth:10): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:07 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit(0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000ffc000/0x2000)=nil], 0x0, &(0x7f00000000c0), 0x0) 22:54:07 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2a, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:07 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 714.690152][T31370] FAULT_INJECTION: forcing a failure. [ 714.690152][T31370] name failslab, interval 1, probability 0, space 0, times 0 22:54:07 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 714.750741][T31370] CPU: 0 PID: 31370 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 714.759188][T31370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.769800][T31370] Call Trace: [ 714.773124][T31370] dump_stack+0x172/0x1f0 [ 714.777505][T31370] should_fail.cold+0xa/0x15 [ 714.782124][T31370] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 714.787967][T31370] ? ___might_sleep+0x163/0x280 [ 714.793798][T31370] __should_failslab+0x121/0x190 22:54:07 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2b, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 714.798760][T31370] should_failslab+0x9/0x14 [ 714.803276][T31370] kmem_cache_alloc_trace+0x2d1/0x760 [ 714.808684][T31370] ? lock_acquire+0x16f/0x3f0 [ 714.813375][T31370] ? alloc_super+0x158/0x890 [ 714.818063][T31370] smack_sb_alloc_security+0x44/0x170 [ 714.823508][T31370] security_sb_alloc+0x69/0xb0 [ 714.828314][T31370] alloc_super+0x160/0x890 [ 714.832750][T31370] ? test_single_super+0x10/0x10 [ 714.837702][T31370] sget_userns+0xf1/0x560 [ 714.842068][T31370] ? kill_litter_super+0x60/0x60 22:54:07 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2c, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 714.847022][T31370] ? test_single_super+0x10/0x10 [ 714.851967][T31370] ? kill_litter_super+0x60/0x60 [ 714.856914][T31370] sget+0x10c/0x150 [ 714.860732][T31370] mount_bdev+0xff/0x3c0 [ 714.864988][T31370] ? udf_load_vrs+0xc80/0xc80 [ 714.869677][T31370] udf_mount+0x35/0x40 [ 714.874019][T31370] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 714.879498][T31370] legacy_get_tree+0xf2/0x200 [ 714.884186][T31370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.890443][T31370] vfs_get_tree+0x123/0x450 [ 714.894959][T31370] do_mount+0x1436/0x2c40 22:54:07 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 714.899326][T31370] ? copy_mount_string+0x40/0x40 [ 714.904290][T31370] ? _copy_from_user+0xdd/0x150 [ 714.909259][T31370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 714.915523][T31370] ? copy_mount_options+0x280/0x3a0 [ 714.920743][T31370] ksys_mount+0xdb/0x150 [ 714.924999][T31370] __x64_sys_mount+0xbe/0x150 [ 714.929691][T31370] do_syscall_64+0x103/0x610 [ 714.934313][T31370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.940215][T31370] RIP: 0033:0x458209 [ 714.944120][T31370] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 714.963837][T31370] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 714.972268][T31370] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 714.980357][T31370] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 714.988524][T31370] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:54:07 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2d, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 714.996540][T31370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 715.004748][T31370] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:07 executing program 0 (fault-call:1 fault-nth:11): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:07 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:07 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 715.215681][T31800] FAULT_INJECTION: forcing a failure. [ 715.215681][T31800] name failslab, interval 1, probability 0, space 0, times 0 [ 715.234781][T31800] CPU: 1 PID: 31800 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 715.242730][T31800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.252791][T31800] Call Trace: [ 715.256469][T31800] dump_stack+0x172/0x1f0 [ 715.260840][T31800] should_fail.cold+0xa/0x15 [ 715.265477][T31800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 715.271323][T31800] ? ___might_sleep+0x163/0x280 [ 715.276892][T31800] __should_failslab+0x121/0x190 [ 715.281858][T31800] should_failslab+0x9/0x14 [ 715.286380][T31800] __kmalloc+0x2dc/0x740 [ 715.290636][T31800] ? lockdep_init_map+0x1be/0x6d0 [ 715.295673][T31800] ? prealloc_shrinker+0xa6/0x350 [ 715.300716][T31800] prealloc_shrinker+0xa6/0x350 [ 715.305674][T31800] alloc_super+0x710/0x890 [ 715.310108][T31800] ? test_single_super+0x10/0x10 [ 715.315337][T31800] sget_userns+0xf1/0x560 [ 715.319673][T31800] ? kill_litter_super+0x60/0x60 [ 715.324608][T31800] ? test_single_super+0x10/0x10 [ 715.329544][T31800] ? kill_litter_super+0x60/0x60 [ 715.334580][T31800] sget+0x10c/0x150 [ 715.338403][T31800] mount_bdev+0xff/0x3c0 [ 715.342647][T31800] ? udf_load_vrs+0xc80/0xc80 [ 715.347414][T31800] udf_mount+0x35/0x40 [ 715.351535][T31800] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 715.357010][T31800] legacy_get_tree+0xf2/0x200 [ 715.361780][T31800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.368040][T31800] vfs_get_tree+0x123/0x450 [ 715.372562][T31800] do_mount+0x1436/0x2c40 [ 715.377012][T31800] ? copy_mount_string+0x40/0x40 [ 715.381989][T31800] ? _copy_from_user+0xdd/0x150 [ 715.386855][T31800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 715.393885][T31800] ? copy_mount_options+0x280/0x3a0 [ 715.399124][T31800] ksys_mount+0xdb/0x150 [ 715.403373][T31800] __x64_sys_mount+0xbe/0x150 [ 715.408140][T31800] do_syscall_64+0x103/0x610 22:54:08 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 22:54:08 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:08 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2e, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:08 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:08 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 715.413010][T31800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.419021][T31800] RIP: 0033:0x458209 [ 715.422911][T31800] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.442521][T31800] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 715.451212][T31800] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 22:54:08 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 715.459225][T31800] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 715.467214][T31800] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 715.475254][T31800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 715.483256][T31800] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:08 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:08 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:08 executing program 0 (fault-call:1 fault-nth:12): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:08 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:08 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 715.695816][T32032] FAULT_INJECTION: forcing a failure. [ 715.695816][T32032] name failslab, interval 1, probability 0, space 0, times 0 [ 715.729686][T32032] CPU: 1 PID: 32032 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 22:54:08 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2f, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:08 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 22:54:08 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 715.737725][T32032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.747797][T32032] Call Trace: [ 715.751121][T32032] dump_stack+0x172/0x1f0 [ 715.755476][T32032] should_fail.cold+0xa/0x15 [ 715.760093][T32032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 715.765914][T32032] ? ___might_sleep+0x163/0x280 [ 715.770785][T32032] __should_failslab+0x121/0x190 [ 715.775782][T32032] should_failslab+0x9/0x14 [ 715.780331][T32032] kmem_cache_alloc_node_trace+0x270/0x720 [ 715.786164][T32032] __kmalloc_node+0x3d/0x70 [ 715.790688][T32032] kvmalloc_node+0x68/0x100 [ 715.795208][T32032] __list_lru_init+0x4a6/0x6e0 [ 715.799991][T32032] alloc_super+0x762/0x890 [ 715.804421][T32032] ? test_single_super+0x10/0x10 [ 715.809372][T32032] sget_userns+0xf1/0x560 [ 715.813894][T32032] ? kill_litter_super+0x60/0x60 [ 715.818856][T32032] ? test_single_super+0x10/0x10 [ 715.823808][T32032] ? kill_litter_super+0x60/0x60 [ 715.828761][T32032] sget+0x10c/0x150 [ 715.832682][T32032] mount_bdev+0xff/0x3c0 [ 715.836936][T32032] ? udf_load_vrs+0xc80/0xc80 [ 715.841628][T32032] udf_mount+0x35/0x40 [ 715.845708][T32032] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 715.851187][T32032] legacy_get_tree+0xf2/0x200 [ 715.855956][T32032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.862216][T32032] vfs_get_tree+0x123/0x450 [ 715.866943][T32032] do_mount+0x1436/0x2c40 [ 715.871334][T32032] ? copy_mount_string+0x40/0x40 [ 715.876906][T32032] ? _copy_from_user+0xdd/0x150 [ 715.881781][T32032] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 715.888048][T32032] ? copy_mount_options+0x280/0x3a0 22:54:08 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 715.894237][T32032] ksys_mount+0xdb/0x150 [ 715.898512][T32032] __x64_sys_mount+0xbe/0x150 [ 715.903215][T32032] do_syscall_64+0x103/0x610 [ 715.907826][T32032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.913726][T32032] RIP: 0033:0x458209 [ 715.917629][T32032] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.937275][T32032] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:54:08 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:08 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 715.945718][T32032] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 715.953722][T32032] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 715.955689][T32035] cgroup: fork rejected by pids controller in /syz4 [ 715.961697][T32032] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 715.961816][T32032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 715.961825][T32032] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:08 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:08 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x30, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:08 executing program 0 (fault-call:1 fault-nth:13): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:08 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 716.286477][T32316] FAULT_INJECTION: forcing a failure. [ 716.286477][T32316] name failslab, interval 1, probability 0, space 0, times 0 [ 716.316649][T32316] CPU: 0 PID: 32316 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 716.324768][T32316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.334837][T32316] Call Trace: [ 716.338146][T32316] dump_stack+0x172/0x1f0 [ 716.342522][T32316] should_fail.cold+0xa/0x15 [ 716.347158][T32316] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 716.353018][T32316] ? ___might_sleep+0x163/0x280 [ 716.357891][T32316] __should_failslab+0x121/0x190 [ 716.362846][T32316] should_failslab+0x9/0x14 [ 716.367393][T32316] kmem_cache_alloc_node_trace+0x270/0x720 [ 716.373225][T32316] __kmalloc_node+0x3d/0x70 [ 716.377748][T32316] kvmalloc_node+0x68/0x100 [ 716.382255][T32316] __list_lru_init+0x4a6/0x6e0 [ 716.387024][T32316] alloc_super+0x762/0x890 [ 716.391438][T32316] ? test_single_super+0x10/0x10 [ 716.396366][T32316] sget_userns+0xf1/0x560 [ 716.400676][T32316] ? kill_litter_super+0x60/0x60 [ 716.405602][T32316] ? test_single_super+0x10/0x10 [ 716.410521][T32316] ? kill_litter_super+0x60/0x60 [ 716.415444][T32316] sget+0x10c/0x150 [ 716.419251][T32316] mount_bdev+0xff/0x3c0 [ 716.423494][T32316] ? udf_load_vrs+0xc80/0xc80 [ 716.428173][T32316] udf_mount+0x35/0x40 [ 716.432240][T32316] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 716.437696][T32316] legacy_get_tree+0xf2/0x200 [ 716.442369][T32316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.448596][T32316] vfs_get_tree+0x123/0x450 [ 716.453094][T32316] do_mount+0x1436/0x2c40 [ 716.457419][T32316] ? copy_mount_string+0x40/0x40 [ 716.462347][T32316] ? _copy_from_user+0xdd/0x150 [ 716.467196][T32316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 716.473437][T32316] ? copy_mount_options+0x280/0x3a0 [ 716.478639][T32316] ksys_mount+0xdb/0x150 [ 716.482870][T32316] __x64_sys_mount+0xbe/0x150 [ 716.487618][T32316] do_syscall_64+0x103/0x610 [ 716.492629][T32316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.498529][T32316] RIP: 0033:0x458209 [ 716.502427][T32316] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 716.522479][T32316] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 716.530884][T32316] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 716.538856][T32316] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 716.546822][T32316] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 716.554876][T32316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 716.563007][T32316] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) lseek(r1, 0x0, 0x0) 22:54:09 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x31, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:09 executing program 0 (fault-call:1 fault-nth:14): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:09 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 716.721407][T32490] FAULT_INJECTION: forcing a failure. [ 716.721407][T32490] name failslab, interval 1, probability 0, space 0, times 0 [ 716.781396][T32490] CPU: 0 PID: 32490 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 716.789342][T32490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.799415][T32490] Call Trace: [ 716.802734][T32490] dump_stack+0x172/0x1f0 [ 716.807086][T32490] should_fail.cold+0xa/0x15 [ 716.811706][T32490] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 716.817547][T32490] ? ___might_sleep+0x163/0x280 [ 716.822417][T32490] __should_failslab+0x121/0x190 [ 716.827373][T32490] should_failslab+0x9/0x14 [ 716.831888][T32490] kmem_cache_alloc_trace+0x2d1/0x760 [ 716.837293][T32490] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 716.843129][T32490] __memcg_init_list_lru_node+0x8a/0x1e0 [ 716.848784][T32490] __list_lru_init+0x3cf/0x6e0 [ 716.853570][T32490] alloc_super+0x762/0x890 [ 716.858219][T32490] ? test_single_super+0x10/0x10 [ 716.863170][T32490] sget_userns+0xf1/0x560 [ 716.867627][T32490] ? kill_litter_super+0x60/0x60 [ 716.872599][T32490] ? test_single_super+0x10/0x10 [ 716.877540][T32490] ? kill_litter_super+0x60/0x60 [ 716.882500][T32490] sget+0x10c/0x150 [ 716.886346][T32490] mount_bdev+0xff/0x3c0 [ 716.890783][T32490] ? udf_load_vrs+0xc80/0xc80 [ 716.895474][T32490] udf_mount+0x35/0x40 [ 716.899566][T32490] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 716.905047][T32490] legacy_get_tree+0xf2/0x200 [ 716.909750][T32490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.916013][T32490] vfs_get_tree+0x123/0x450 [ 716.920635][T32490] do_mount+0x1436/0x2c40 [ 716.924984][T32490] ? copy_mount_string+0x40/0x40 [ 716.929986][T32490] ? _copy_from_user+0xdd/0x150 [ 716.935031][T32490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 716.941311][T32490] ? copy_mount_options+0x280/0x3a0 [ 716.946535][T32490] ksys_mount+0xdb/0x150 [ 716.950798][T32490] __x64_sys_mount+0xbe/0x150 [ 716.955853][T32490] do_syscall_64+0x103/0x610 [ 716.960470][T32490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.966389][T32490] RIP: 0033:0x458209 [ 716.970299][T32490] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 716.990030][T32490] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 716.990047][T32490] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 716.990055][T32490] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 716.990062][T32490] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 716.990069][T32490] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:09 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 716.990078][T32490] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:09 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) 22:54:09 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:09 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:10 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x32, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:10 executing program 0 (fault-call:1 fault-nth:15): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:10 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:10 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 717.216808][T32724] FAULT_INJECTION: forcing a failure. [ 717.216808][T32724] name failslab, interval 1, probability 0, space 0, times 0 [ 717.231075][ C0] net_ratelimit: 20 callbacks suppressed [ 717.231084][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.242782][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 717.261239][T32724] CPU: 1 PID: 32724 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 717.269181][T32724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.279247][T32724] Call Trace: [ 717.279289][T32724] dump_stack+0x172/0x1f0 [ 717.279323][T32724] should_fail.cold+0xa/0x15 [ 717.291544][T32724] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 717.297388][T32724] ? ___might_sleep+0x163/0x280 [ 717.302258][T32724] __should_failslab+0x121/0x190 [ 717.302288][T32724] should_failslab+0x9/0x14 [ 717.302304][T32724] kmem_cache_alloc_trace+0x2d1/0x760 [ 717.302321][T32724] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 717.302344][T32724] __memcg_init_list_lru_node+0x8a/0x1e0 [ 717.302362][T32724] __list_lru_init+0x3cf/0x6e0 [ 717.302380][T32724] alloc_super+0x762/0x890 [ 717.302395][T32724] ? test_single_super+0x10/0x10 [ 717.302411][T32724] sget_userns+0xf1/0x560 [ 717.302423][T32724] ? kill_litter_super+0x60/0x60 [ 717.302448][T32724] ? test_single_super+0x10/0x10 [ 717.357954][T32724] ? kill_litter_super+0x60/0x60 [ 717.363085][T32724] sget+0x10c/0x150 [ 717.366918][T32724] mount_bdev+0xff/0x3c0 [ 717.371186][T32724] ? udf_load_vrs+0xc80/0xc80 [ 717.375902][T32724] udf_mount+0x35/0x40 [ 717.380340][T32724] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 717.385826][T32724] legacy_get_tree+0xf2/0x200 [ 717.390616][T32724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.396960][T32724] vfs_get_tree+0x123/0x450 [ 717.401483][T32724] do_mount+0x1436/0x2c40 [ 717.405840][T32724] ? copy_mount_string+0x40/0x40 [ 717.410893][T32724] ? _copy_from_user+0xdd/0x150 [ 717.415784][T32724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.422047][T32724] ? copy_mount_options+0x280/0x3a0 [ 717.427265][T32724] ksys_mount+0xdb/0x150 [ 717.431548][T32724] __x64_sys_mount+0xbe/0x150 [ 717.436245][T32724] do_syscall_64+0x103/0x610 [ 717.440866][T32724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.446775][T32724] RIP: 0033:0x458209 22:54:10 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:10 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:10 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 717.451565][T32724] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 717.471358][T32724] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 717.479991][T32724] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 717.488239][T32724] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 717.497113][T32724] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 717.505132][T32724] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:10 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 717.513202][T32724] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 717.551078][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 717.556966][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 717.791077][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 717.796892][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:10 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 22:54:10 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x33, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:10 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:10 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:10 executing program 0 (fault-call:1 fault-nth:16): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:10 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:11 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 718.111124][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 718.117029][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:11 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:11 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:11 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x34, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:11 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 718.351167][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 718.357046][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:11 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:11 executing program 1: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000040)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ptrace(0xffffffffffffffff, r0) 22:54:11 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x35, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:11 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:11 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 718.542363][ T544] FAULT_INJECTION: forcing a failure. [ 718.542363][ T544] name failslab, interval 1, probability 0, space 0, times 0 [ 718.570014][ T544] CPU: 1 PID: 544 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 718.577782][ T544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.587859][ T544] Call Trace: [ 718.591191][ T544] dump_stack+0x172/0x1f0 [ 718.595552][ T544] should_fail.cold+0xa/0x15 [ 718.600163][ T544] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 718.605982][ T544] ? ___might_sleep+0x163/0x280 [ 718.610860][ T544] __should_failslab+0x121/0x190 [ 718.615822][ T544] should_failslab+0x9/0x14 [ 718.620367][ T544] kmem_cache_alloc_trace+0x2d1/0x760 [ 718.625758][ T544] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 718.631585][ T544] __memcg_init_list_lru_node+0x8a/0x1e0 [ 718.637238][ T544] __list_lru_init+0x3cf/0x6e0 [ 718.642033][ T544] alloc_super+0x762/0x890 [ 718.646474][ T544] ? test_single_super+0x10/0x10 [ 718.651426][ T544] sget_userns+0xf1/0x560 [ 718.651442][ T544] ? kill_litter_super+0x60/0x60 [ 718.651460][ T544] ? test_single_super+0x10/0x10 [ 718.651471][ T544] ? kill_litter_super+0x60/0x60 [ 718.651483][ T544] sget+0x10c/0x150 [ 718.651501][ T544] mount_bdev+0xff/0x3c0 [ 718.651523][ T544] ? udf_load_vrs+0xc80/0xc80 [ 718.660823][ T544] udf_mount+0x35/0x40 [ 718.687510][ T544] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 718.692992][ T544] legacy_get_tree+0xf2/0x200 [ 718.697711][ T544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.703956][ T544] vfs_get_tree+0x123/0x450 [ 718.712389][ T544] do_mount+0x1436/0x2c40 [ 718.716726][ T544] ? copy_mount_string+0x40/0x40 [ 718.721665][ T544] ? _copy_from_user+0xdd/0x150 [ 718.726686][ T544] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 718.732918][ T544] ? copy_mount_options+0x280/0x3a0 [ 718.738112][ T544] ksys_mount+0xdb/0x150 [ 718.742537][ T544] __x64_sys_mount+0xbe/0x150 [ 718.747254][ T544] do_syscall_64+0x103/0x610 [ 718.751846][ T544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.758216][ T544] RIP: 0033:0x458209 [ 718.762098][ T544] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.781720][ T544] RSP: 002b:00007fa54599ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 718.790141][ T544] RAX: ffffffffffffffda RBX: 00007fa54599ac90 RCX: 0000000000458209 22:54:11 executing program 0 (fault-call:1 fault-nth:17): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:11 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:11 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:11 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 718.798113][ T544] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 718.806086][ T544] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 718.814072][ T544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa54599b6d4 [ 718.822037][ T544] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:11 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x36, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:11 executing program 1: getitimer(0x4, &(0x7f0000000040)) 22:54:11 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:11 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 22:54:11 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 718.961775][ T943] FAULT_INJECTION: forcing a failure. [ 718.961775][ T943] name failslab, interval 1, probability 0, space 0, times 0 [ 719.063790][ T943] CPU: 0 PID: 943 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 719.071590][ T943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.081665][ T943] Call Trace: [ 719.084985][ T943] dump_stack+0x172/0x1f0 [ 719.089421][ T943] should_fail.cold+0xa/0x15 [ 719.094034][ T943] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 719.099881][ T943] ? ___might_sleep+0x163/0x280 [ 719.104775][ T943] __should_failslab+0x121/0x190 [ 719.109737][ T943] should_failslab+0x9/0x14 [ 719.114253][ T943] kmem_cache_alloc_trace+0x2d1/0x760 [ 719.119674][ T943] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 719.125500][ T943] __memcg_init_list_lru_node+0x8a/0x1e0 [ 719.131146][ T943] __list_lru_init+0x3cf/0x6e0 [ 719.135923][ T943] alloc_super+0x762/0x890 [ 719.140348][ T943] ? test_single_super+0x10/0x10 [ 719.145314][ T943] sget_userns+0xf1/0x560 [ 719.149661][ T943] ? kill_litter_super+0x60/0x60 [ 719.154785][ T943] ? test_single_super+0x10/0x10 [ 719.159726][ T943] ? kill_litter_super+0x60/0x60 [ 719.164683][ T943] sget+0x10c/0x150 [ 719.168510][ T943] mount_bdev+0xff/0x3c0 [ 719.172937][ T943] ? udf_load_vrs+0xc80/0xc80 [ 719.177627][ T943] udf_mount+0x35/0x40 [ 719.181703][ T943] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 719.181723][ T943] legacy_get_tree+0xf2/0x200 [ 719.181741][ T943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.181756][ T943] vfs_get_tree+0x123/0x450 [ 719.181772][ T943] do_mount+0x1436/0x2c40 [ 719.181792][ T943] ? copy_mount_string+0x40/0x40 [ 719.181811][ T943] ? _copy_from_user+0xdd/0x150 [ 719.181828][ T943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.181842][ T943] ? copy_mount_options+0x280/0x3a0 [ 719.181861][ T943] ksys_mount+0xdb/0x150 [ 719.181878][ T943] __x64_sys_mount+0xbe/0x150 [ 719.181898][ T943] do_syscall_64+0x103/0x610 [ 719.181918][ T943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.181930][ T943] RIP: 0033:0x458209 22:54:12 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 22:54:12 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:12 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x37, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 719.181950][ T943] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.192077][ T943] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.279589][ T943] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 719.287581][ T943] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 719.295572][ T943] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 719.303560][ T943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 719.311544][ T943] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:12 executing program 0 (fault-call:1 fault-nth:18): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:12 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 22:54:12 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@ipv4}, 0x20) 22:54:12 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 22:54:12 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:12 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x38, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:12 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 22:54:12 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 22:54:12 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) [ 719.529773][ T1201] FAULT_INJECTION: forcing a failure. [ 719.529773][ T1201] name failslab, interval 1, probability 0, space 0, times 0 [ 719.576550][ T1201] CPU: 0 PID: 1201 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 719.584405][ T1201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.594469][ T1201] Call Trace: [ 719.597867][ T1201] dump_stack+0x172/0x1f0 [ 719.602218][ T1201] should_fail.cold+0xa/0x15 [ 719.606829][ T1201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 719.612651][ T1201] ? ___might_sleep+0x163/0x280 [ 719.617533][ T1201] __should_failslab+0x121/0x190 [ 719.622515][ T1201] should_failslab+0x9/0x14 [ 719.627036][ T1201] kmem_cache_alloc_trace+0x2d1/0x760 [ 719.632438][ T1201] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 719.638269][ T1201] __memcg_init_list_lru_node+0x8a/0x1e0 [ 719.643949][ T1201] __list_lru_init+0x3cf/0x6e0 [ 719.648733][ T1201] alloc_super+0x762/0x890 [ 719.653248][ T1201] ? test_single_super+0x10/0x10 [ 719.658211][ T1201] sget_userns+0xf1/0x560 [ 719.662549][ T1201] ? kill_litter_super+0x60/0x60 [ 719.667493][ T1201] ? test_single_super+0x10/0x10 [ 719.672435][ T1201] ? kill_litter_super+0x60/0x60 [ 719.677468][ T1201] sget+0x10c/0x150 [ 719.681313][ T1201] mount_bdev+0xff/0x3c0 [ 719.685567][ T1201] ? udf_load_vrs+0xc80/0xc80 [ 719.690265][ T1201] udf_mount+0x35/0x40 [ 719.694356][ T1201] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 719.699832][ T1201] legacy_get_tree+0xf2/0x200 [ 719.704531][ T1201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.710793][ T1201] vfs_get_tree+0x123/0x450 [ 719.715327][ T1201] do_mount+0x1436/0x2c40 [ 719.719672][ T1201] ? copy_mount_string+0x40/0x40 [ 719.724622][ T1201] ? _copy_from_user+0xdd/0x150 [ 719.729491][ T1201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.735833][ T1201] ? copy_mount_options+0x280/0x3a0 [ 719.741045][ T1201] ksys_mount+0xdb/0x150 [ 719.745319][ T1201] __x64_sys_mount+0xbe/0x150 [ 719.750012][ T1201] do_syscall_64+0x103/0x610 [ 719.754649][ T1201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.760999][ T1201] RIP: 0033:0x458209 22:54:12 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:12 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 22:54:12 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 719.764911][ T1201] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.785643][ T1201] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.794069][ T1201] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 719.794079][ T1201] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 719.794087][ T1201] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 719.794094][ T1201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:12 executing program 0 (fault-call:1 fault-nth:19): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 22:54:12 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:12 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x39, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 719.794102][ T1201] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:12 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 22:54:12 executing program 3: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 719.957784][ T1442] FAULT_INJECTION: forcing a failure. [ 719.957784][ T1442] name failslab, interval 1, probability 0, space 0, times 0 [ 719.981433][ T1442] CPU: 0 PID: 1442 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 719.989293][ T1442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.999365][ T1442] Call Trace: [ 720.002686][ T1442] dump_stack+0x172/0x1f0 [ 720.007083][ T1442] should_fail.cold+0xa/0x15 [ 720.011698][ T1442] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 720.017524][ T1442] ? ___might_sleep+0x163/0x280 [ 720.022491][ T1442] __should_failslab+0x121/0x190 [ 720.027531][ T1442] should_failslab+0x9/0x14 [ 720.032138][ T1442] kmem_cache_alloc_trace+0x2d1/0x760 [ 720.037525][ T1442] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 720.043351][ T1442] __memcg_init_list_lru_node+0x8a/0x1e0 [ 720.049021][ T1442] __list_lru_init+0x3cf/0x6e0 [ 720.053798][ T1442] alloc_super+0x762/0x890 22:54:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 720.058226][ T1442] ? test_single_super+0x10/0x10 [ 720.063176][ T1442] sget_userns+0xf1/0x560 [ 720.067520][ T1442] ? kill_litter_super+0x60/0x60 [ 720.072464][ T1442] ? test_single_super+0x10/0x10 [ 720.077412][ T1442] ? kill_litter_super+0x60/0x60 [ 720.082356][ T1442] sget+0x10c/0x150 [ 720.086177][ T1442] mount_bdev+0xff/0x3c0 [ 720.090681][ T1442] ? udf_load_vrs+0xc80/0xc80 [ 720.095366][ T1442] udf_mount+0x35/0x40 [ 720.099447][ T1442] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 720.104917][ T1442] legacy_get_tree+0xf2/0x200 [ 720.109602][ T1442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.115858][ T1442] vfs_get_tree+0x123/0x450 [ 720.120369][ T1442] do_mount+0x1436/0x2c40 [ 720.124717][ T1442] ? copy_mount_string+0x40/0x40 [ 720.129667][ T1442] ? _copy_from_user+0xdd/0x150 [ 720.134629][ T1442] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 720.142366][ T1442] ? copy_mount_options+0x280/0x3a0 [ 720.147678][ T1442] ksys_mount+0xdb/0x150 [ 720.151938][ T1442] __x64_sys_mount+0xbe/0x150 22:54:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r1, 0x0) 22:54:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 720.156639][ T1442] do_syscall_64+0x103/0x610 [ 720.161254][ T1442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.167177][ T1442] RIP: 0033:0x458209 [ 720.171078][ T1442] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 720.190692][ T1442] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 720.199125][ T1442] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 22:54:13 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x3a, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:13 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:13 executing program 5: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 720.207213][ T1442] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 720.215201][ T1442] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 720.223198][ T1442] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 720.231191][ T1442] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:13 executing program 0 (fault-call:1 fault-nth:20): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:13 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="0e"], 0x1) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x100002000000105, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000340)="17", 0x1}]) 22:54:13 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x400002100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x801, 0x8000) ftruncate(r0, 0x0) 22:54:13 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:13 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x3b, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000240)={0x15, "669855b3d925e5abc9f23d582dac7e44cb07916204ee28af7fc204fb88440f7e331c845acef834c77fcb15ac5df551e3e1420fb7316ea93a263b1040a71142efcbc446c823990077eb5b71f17842b0ca12f4bf35d4a23b32b14c20689a4f6f3935070457d8a42f66ba25251d0d33f0e83d5aab2164e64b1b883da159dda07cea"}) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x800000000000004) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r1, 0x0) r3 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80800) bind$inet(r3, 0x0, 0x27) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000680)={{0x2, 0x4e24, @multicast1}, {0x1, @random="9f20ec5ca5b8"}, 0x43, {0x2, 0x4e22, @remote}, 'gre0\x00'}) bind$llc(r2, &(0x7f0000000200)={0x1a, 0x30d, 0x4, 0x6, 0x3373, 0x23f33}, 0x10) r4 = accept4(r1, 0x0, &(0x7f00000001c0), 0x80800) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000480)=0x1e5, 0x320) setsockopt$inet_dccp_int(r4, 0x21, 0xf, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000300)={r1}) getsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000340), &(0x7f00000003c0)=0x4) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = epoll_create(0x9fa3) recvfrom$llc(r5, 0x0, 0x0, 0x40012100, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000100)={0x60000008}) getsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f00000004c0), &(0x7f0000000540)=0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e24, @local}, 0x10) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x40, 0x200003, 0x7ff}, 0x10) connect$llc(r2, &(0x7f0000000140)={0x1a, 0x300, 0x7, 0x9, 0xfffffffffffffffc, 0x3}, 0x10) [ 720.480026][ T2083] FAULT_INJECTION: forcing a failure. [ 720.480026][ T2083] name failslab, interval 1, probability 0, space 0, times 0 [ 720.501135][ T2083] CPU: 0 PID: 2083 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 720.509009][ T2083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.519083][ T2083] Call Trace: [ 720.522398][ T2083] dump_stack+0x172/0x1f0 [ 720.526751][ T2083] should_fail.cold+0xa/0x15 [ 720.531368][ T2083] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 720.537189][ T2083] ? ___might_sleep+0x163/0x280 [ 720.542057][ T2083] __should_failslab+0x121/0x190 [ 720.547013][ T2083] should_failslab+0x9/0x14 [ 720.551530][ T2083] kmem_cache_alloc_trace+0x2d1/0x760 [ 720.556921][ T2083] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 720.562752][ T2083] __memcg_init_list_lru_node+0x8a/0x1e0 [ 720.568410][ T2083] __list_lru_init+0x3cf/0x6e0 [ 720.573224][ T2083] alloc_super+0x762/0x890 [ 720.577746][ T2083] ? test_single_super+0x10/0x10 [ 720.582699][ T2083] sget_userns+0xf1/0x560 [ 720.587067][ T2083] ? kill_litter_super+0x60/0x60 [ 720.592022][ T2083] ? test_single_super+0x10/0x10 [ 720.596975][ T2083] ? kill_litter_super+0x60/0x60 [ 720.601923][ T2083] sget+0x10c/0x150 [ 720.605749][ T2083] mount_bdev+0xff/0x3c0 [ 720.610007][ T2083] ? udf_load_vrs+0xc80/0xc80 [ 720.614708][ T2083] udf_mount+0x35/0x40 [ 720.618791][ T2083] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 720.624267][ T2083] legacy_get_tree+0xf2/0x200 [ 720.628980][ T2083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.635243][ T2083] vfs_get_tree+0x123/0x450 [ 720.639778][ T2083] do_mount+0x1436/0x2c40 [ 720.644134][ T2083] ? copy_mount_string+0x40/0x40 [ 720.649087][ T2083] ? _copy_from_user+0xdd/0x150 [ 720.653960][ T2083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 720.660342][ T2083] ? copy_mount_options+0x280/0x3a0 [ 720.665560][ T2083] ksys_mount+0xdb/0x150 [ 720.669817][ T2083] __x64_sys_mount+0xbe/0x150 [ 720.674513][ T2083] do_syscall_64+0x103/0x610 [ 720.679125][ T2083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.685066][ T2083] RIP: 0033:0x458209 [ 720.688968][ T2083] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 720.712148][ T2083] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 720.720578][ T2083] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 22:54:13 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x10000}, 0x10) 22:54:13 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x3c, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:13 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 720.728567][ T2083] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 720.736558][ T2083] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 720.744550][ T2083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 720.752535][ T2083] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:13 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:13 executing program 0 (fault-call:1 fault-nth:21): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:13 executing program 3: mkdir(0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) [ 720.928116][ T2601] FAULT_INJECTION: forcing a failure. [ 720.928116][ T2601] name failslab, interval 1, probability 0, space 0, times 0 [ 720.956496][ T2601] CPU: 0 PID: 2601 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 720.964354][ T2601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.974516][ T2601] Call Trace: [ 720.977829][ T2601] dump_stack+0x172/0x1f0 [ 720.982182][ T2601] should_fail.cold+0xa/0x15 [ 720.986804][ T2601] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 720.992643][ T2601] ? ___might_sleep+0x163/0x280 [ 720.997518][ T2601] __should_failslab+0x121/0x190 [ 721.002474][ T2601] should_failslab+0x9/0x14 [ 721.006991][ T2601] kmem_cache_alloc_trace+0x2d1/0x760 [ 721.012375][ T2601] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 721.018203][ T2601] __memcg_init_list_lru_node+0x8a/0x1e0 [ 721.023878][ T2601] __list_lru_init+0x3cf/0x6e0 22:54:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x4000000003e, 0x105}, 0x14}}, 0x0) 22:54:13 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x3d, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 721.028655][ T2601] alloc_super+0x762/0x890 [ 721.033087][ T2601] ? test_single_super+0x10/0x10 [ 721.038038][ T2601] sget_userns+0xf1/0x560 [ 721.042378][ T2601] ? kill_litter_super+0x60/0x60 [ 721.047337][ T2601] ? test_single_super+0x10/0x10 [ 721.052290][ T2601] ? kill_litter_super+0x60/0x60 [ 721.057247][ T2601] sget+0x10c/0x150 [ 721.061121][ T2601] mount_bdev+0xff/0x3c0 [ 721.065376][ T2601] ? udf_load_vrs+0xc80/0xc80 [ 721.070068][ T2601] udf_mount+0x35/0x40 [ 721.074154][ T2601] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 721.079634][ T2601] legacy_get_tree+0xf2/0x200 [ 721.084333][ T2601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.090619][ T2601] vfs_get_tree+0x123/0x450 [ 721.095140][ T2601] do_mount+0x1436/0x2c40 [ 721.099521][ T2601] ? copy_mount_string+0x40/0x40 [ 721.104475][ T2601] ? _copy_from_user+0xdd/0x150 [ 721.109520][ T2601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 721.115780][ T2601] ? copy_mount_options+0x280/0x3a0 [ 721.120996][ T2601] ksys_mount+0xdb/0x150 [ 721.125258][ T2601] __x64_sys_mount+0xbe/0x150 [ 721.129972][ T2601] do_syscall_64+0x103/0x610 [ 721.134586][ T2601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.140496][ T2601] RIP: 0033:0x458209 [ 721.144403][ T2601] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 721.164053][ T2601] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:54:14 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:14 executing program 5: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0x8}, 0x10) [ 721.172481][ T2601] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 721.180472][ T2601] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 721.188464][ T2601] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 721.196457][ T2601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 721.204443][ T2601] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 721.214414][ T2730] device lo entered promiscuous mode 22:54:14 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x3e, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:14 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 22:54:14 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:14 executing program 0 (fault-call:1 fault-nth:22): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:14 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x41, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 721.530377][ T3258] FAULT_INJECTION: forcing a failure. [ 721.530377][ T3258] name failslab, interval 1, probability 0, space 0, times 0 [ 721.571784][ T3258] CPU: 0 PID: 3258 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 721.579641][ T3258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.589726][ T3258] Call Trace: [ 721.593044][ T3258] dump_stack+0x172/0x1f0 [ 721.597396][ T3258] should_fail.cold+0xa/0x15 [ 721.602015][ T3258] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 721.607845][ T3258] ? ___might_sleep+0x163/0x280 [ 721.612723][ T3258] __should_failslab+0x121/0x190 [ 721.617676][ T3258] should_failslab+0x9/0x14 [ 721.622193][ T3258] kmem_cache_alloc_trace+0x2d1/0x760 [ 721.627581][ T3258] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 721.633414][ T3258] __memcg_init_list_lru_node+0x8a/0x1e0 [ 721.639078][ T3258] __list_lru_init+0x3cf/0x6e0 [ 721.643864][ T3258] alloc_super+0x762/0x890 [ 721.648317][ T3258] ? test_single_super+0x10/0x10 [ 721.653272][ T3258] sget_userns+0xf1/0x560 [ 721.657634][ T3258] ? kill_litter_super+0x60/0x60 [ 721.662582][ T3258] ? test_single_super+0x10/0x10 [ 721.667527][ T3258] ? kill_litter_super+0x60/0x60 [ 721.672480][ T3258] sget+0x10c/0x150 [ 721.676314][ T3258] mount_bdev+0xff/0x3c0 [ 721.680569][ T3258] ? udf_load_vrs+0xc80/0xc80 [ 721.685273][ T3258] udf_mount+0x35/0x40 [ 721.689374][ T3258] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 721.694849][ T3258] legacy_get_tree+0xf2/0x200 [ 721.699542][ T3258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.705802][ T3258] vfs_get_tree+0x123/0x450 [ 721.710338][ T3258] do_mount+0x1436/0x2c40 [ 721.714687][ T3258] ? copy_mount_string+0x40/0x40 [ 721.719641][ T3258] ? _copy_from_user+0xdd/0x150 [ 721.724511][ T3258] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 721.730765][ T3258] ? copy_mount_options+0x280/0x3a0 [ 721.735983][ T3258] ksys_mount+0xdb/0x150 [ 721.740344][ T3258] __x64_sys_mount+0xbe/0x150 [ 721.745044][ T3258] do_syscall_64+0x103/0x610 [ 721.749665][ T3258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.755569][ T3258] RIP: 0033:0x458209 [ 721.759971][ T3258] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 721.779603][ T3258] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 721.788024][ T3258] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 721.796084][ T3258] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 721.804057][ T3258] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 721.812037][ T3258] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:14 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x42, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:14 executing program 3: 22:54:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000500)=""/53, 0x35}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r2 = fcntl$dupfd(r1, 0x0, r1) write$P9_RMKDIR(r2, 0x0, 0x1ce) shutdown(r2, 0x0) 22:54:14 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 721.820012][ T3258] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:14 executing program 0 (fault-call:1 fault-nth:23): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 722.034267][ T3621] FAULT_INJECTION: forcing a failure. [ 722.034267][ T3621] name failslab, interval 1, probability 0, space 0, times 0 [ 722.078905][ T3621] CPU: 0 PID: 3621 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 722.086762][ T3621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.096831][ T3621] Call Trace: [ 722.100142][ T3621] dump_stack+0x172/0x1f0 [ 722.104488][ T3621] should_fail.cold+0xa/0x15 [ 722.109095][ T3621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 722.114920][ T3621] ? ___might_sleep+0x163/0x280 [ 722.119782][ T3621] __should_failslab+0x121/0x190 [ 722.124736][ T3621] should_failslab+0x9/0x14 [ 722.129255][ T3621] kmem_cache_alloc_trace+0x2d1/0x760 [ 722.134656][ T3621] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 722.140495][ T3621] __memcg_init_list_lru_node+0x8a/0x1e0 [ 722.146155][ T3621] __list_lru_init+0x3cf/0x6e0 [ 722.150942][ T3621] alloc_super+0x762/0x890 [ 722.155375][ T3621] ? test_single_super+0x10/0x10 [ 722.160336][ T3621] sget_userns+0xf1/0x560 [ 722.164671][ T3621] ? kill_litter_super+0x60/0x60 [ 722.169631][ T3621] ? test_single_super+0x10/0x10 [ 722.174555][ T3621] ? kill_litter_super+0x60/0x60 [ 722.179484][ T3621] sget+0x10c/0x150 [ 722.183318][ T3621] mount_bdev+0xff/0x3c0 [ 722.187548][ T3621] ? udf_load_vrs+0xc80/0xc80 [ 722.192210][ T3621] udf_mount+0x35/0x40 [ 722.196264][ T3621] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 722.201719][ T3621] legacy_get_tree+0xf2/0x200 [ 722.206383][ T3621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.212630][ T3621] vfs_get_tree+0x123/0x450 [ 722.217134][ T3621] do_mount+0x1436/0x2c40 [ 722.221484][ T3621] ? copy_mount_string+0x40/0x40 [ 722.226461][ T3621] ? _copy_from_user+0xdd/0x150 [ 722.231317][ T3621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 722.237552][ T3621] ? copy_mount_options+0x280/0x3a0 [ 722.242741][ T3621] ksys_mount+0xdb/0x150 [ 722.247104][ T3621] __x64_sys_mount+0xbe/0x150 [ 722.251785][ T3621] do_syscall_64+0x103/0x610 [ 722.256381][ T3621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.262277][ T3621] RIP: 0033:0x458209 [ 722.266195][ T3621] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 722.285791][ T3621] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 722.294214][ T3621] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 722.302178][ T3621] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 722.310369][ T3621] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 722.318331][ T3621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:15 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:15 executing program 3: 22:54:15 executing program 1: 22:54:15 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x2, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:15 executing program 5: [ 722.326294][ T3621] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 722.334580][ C0] net_ratelimit: 20 callbacks suppressed [ 722.334588][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 722.346068][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:15 executing program 0 (fault-call:1 fault-nth:24): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:15 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:15 executing program 1: 22:54:15 executing program 3: 22:54:15 executing program 5: [ 722.521121][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 722.527007][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 722.544149][ T3800] FAULT_INJECTION: forcing a failure. [ 722.544149][ T3800] name failslab, interval 1, probability 0, space 0, times 0 [ 722.561469][ T3800] CPU: 0 PID: 3800 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 22:54:15 executing program 1: [ 722.569317][ T3800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.579385][ T3800] Call Trace: [ 722.582699][ T3800] dump_stack+0x172/0x1f0 [ 722.587049][ T3800] should_fail.cold+0xa/0x15 [ 722.591669][ T3800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 722.597500][ T3800] ? ___might_sleep+0x163/0x280 [ 722.602380][ T3800] __should_failslab+0x121/0x190 [ 722.607345][ T3800] should_failslab+0x9/0x14 [ 722.611866][ T3800] kmem_cache_alloc_node_trace+0x270/0x720 22:54:15 executing program 5: [ 722.617690][ T3800] ? kmem_cache_alloc_trace+0x354/0x760 [ 722.623259][ T3800] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 722.629100][ T3800] __kmalloc_node+0x3d/0x70 [ 722.633626][ T3800] kvmalloc_node+0x68/0x100 [ 722.638145][ T3800] __list_lru_init+0x4a6/0x6e0 [ 722.642931][ T3800] alloc_super+0x762/0x890 [ 722.647364][ T3800] ? test_single_super+0x10/0x10 [ 722.652325][ T3800] sget_userns+0xf1/0x560 [ 722.656667][ T3800] ? kill_litter_super+0x60/0x60 [ 722.661621][ T3800] ? test_single_super+0x10/0x10 [ 722.666570][ T3800] ? kill_litter_super+0x60/0x60 22:54:15 executing program 1: [ 722.671533][ T3800] sget+0x10c/0x150 [ 722.675358][ T3800] mount_bdev+0xff/0x3c0 [ 722.679626][ T3800] ? udf_load_vrs+0xc80/0xc80 [ 722.684333][ T3800] udf_mount+0x35/0x40 [ 722.688427][ T3800] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 722.694181][ T3800] legacy_get_tree+0xf2/0x200 [ 722.698887][ T3800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.705167][ T3800] vfs_get_tree+0x123/0x450 [ 722.713621][ T3800] do_mount+0x1436/0x2c40 [ 722.718164][ T3800] ? copy_mount_string+0x40/0x40 [ 722.723154][ T3800] ? _copy_from_user+0xdd/0x150 [ 722.728112][ T3800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 722.734372][ T3800] ? copy_mount_options+0x280/0x3a0 [ 722.739595][ T3800] ksys_mount+0xdb/0x150 [ 722.743855][ T3800] __x64_sys_mount+0xbe/0x150 [ 722.748553][ T3800] do_syscall_64+0x103/0x610 [ 722.753165][ T3800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.759541][ T3800] RIP: 0033:0x458209 22:54:15 executing program 5: [ 722.763447][ T3800] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 722.783151][ T3800] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 722.791582][ T3800] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 722.799573][ T3800] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 722.807571][ T3800] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:54:15 executing program 1: [ 722.815560][ T3800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 722.823640][ T3800] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:15 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x3, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:15 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:15 executing program 3: 22:54:15 executing program 0 (fault-call:1 fault-nth:25): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:15 executing program 5: 22:54:15 executing program 3: [ 722.911095][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 722.916936][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:15 executing program 1: 22:54:15 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xffffffffffffffff, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:15 executing program 3: 22:54:15 executing program 5: [ 723.037298][ T3869] FAULT_INJECTION: forcing a failure. [ 723.037298][ T3869] name failslab, interval 1, probability 0, space 0, times 0 [ 723.103937][ T3869] CPU: 1 PID: 3869 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 723.111817][ T3869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.121891][ T3869] Call Trace: [ 723.125215][ T3869] dump_stack+0x172/0x1f0 [ 723.129572][ T3869] should_fail.cold+0xa/0x15 [ 723.134194][ T3869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 723.140031][ T3869] ? ___might_sleep+0x163/0x280 [ 723.144922][ T3869] __should_failslab+0x121/0x190 [ 723.149893][ T3869] should_failslab+0x9/0x14 [ 723.154418][ T3869] kmem_cache_alloc_trace+0x2d1/0x760 [ 723.159826][ T3869] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 723.165666][ T3869] __memcg_init_list_lru_node+0x8a/0x1e0 [ 723.171341][ T3869] __list_lru_init+0x3cf/0x6e0 [ 723.176127][ T3869] alloc_super+0x762/0x890 [ 723.180564][ T3869] ? test_single_super+0x10/0x10 [ 723.185524][ T3869] sget_userns+0xf1/0x560 [ 723.189875][ T3869] ? kill_litter_super+0x60/0x60 [ 723.194836][ T3869] ? test_single_super+0x10/0x10 [ 723.199787][ T3869] ? kill_litter_super+0x60/0x60 [ 723.204746][ T3869] sget+0x10c/0x150 [ 723.208575][ T3869] mount_bdev+0xff/0x3c0 [ 723.212833][ T3869] ? udf_load_vrs+0xc80/0xc80 [ 723.217526][ T3869] udf_mount+0x35/0x40 [ 723.221607][ T3869] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 723.227083][ T3869] legacy_get_tree+0xf2/0x200 [ 723.231775][ T3869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.238038][ T3869] vfs_get_tree+0x123/0x450 [ 723.242557][ T3869] do_mount+0x1436/0x2c40 [ 723.246909][ T3869] ? copy_mount_string+0x40/0x40 22:54:16 executing program 5: 22:54:16 executing program 3: [ 723.251863][ T3869] ? _copy_from_user+0xdd/0x150 [ 723.256732][ T3869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.263065][ T3869] ? copy_mount_options+0x280/0x3a0 [ 723.263084][ T3869] ksys_mount+0xdb/0x150 [ 723.263102][ T3869] __x64_sys_mount+0xbe/0x150 [ 723.263125][ T3869] do_syscall_64+0x103/0x610 [ 723.272575][ T3869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.287709][ T3869] RIP: 0033:0x458209 [ 723.291617][ T3869] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 723.311758][ T3869] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 723.320193][ T3869] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 723.328180][ T3869] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 723.336169][ T3869] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 723.344161][ T3869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:16 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x4, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:16 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:16 executing program 3: [ 723.352144][ T3869] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:16 executing program 0 (fault-call:1 fault-nth:26): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:16 executing program 5: 22:54:16 executing program 1: 22:54:16 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 723.471174][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 723.477057][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:16 executing program 1: 22:54:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4(r0, 0x0, 0x0, 0x0) 22:54:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) [ 723.513006][ T4134] FAULT_INJECTION: forcing a failure. [ 723.513006][ T4134] name failslab, interval 1, probability 0, space 0, times 0 [ 723.613767][ T4134] CPU: 0 PID: 4134 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 723.621649][ T4134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.631719][ T4134] Call Trace: [ 723.635029][ T4134] dump_stack+0x172/0x1f0 [ 723.639376][ T4134] should_fail.cold+0xa/0x15 [ 723.643988][ T4134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 723.649812][ T4134] ? ___might_sleep+0x163/0x280 [ 723.654675][ T4134] __should_failslab+0x121/0x190 [ 723.659628][ T4134] should_failslab+0x9/0x14 [ 723.664138][ T4134] kmem_cache_alloc_trace+0x2d1/0x760 [ 723.669529][ T4134] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 723.675367][ T4134] __memcg_init_list_lru_node+0x8a/0x1e0 [ 723.681015][ T4134] __list_lru_init+0x3cf/0x6e0 [ 723.685798][ T4134] alloc_super+0x762/0x890 [ 723.690233][ T4134] ? test_single_super+0x10/0x10 [ 723.695183][ T4134] sget_userns+0xf1/0x560 [ 723.699525][ T4134] ? kill_litter_super+0x60/0x60 [ 723.704479][ T4134] ? test_single_super+0x10/0x10 [ 723.709427][ T4134] ? kill_litter_super+0x60/0x60 [ 723.714376][ T4134] sget+0x10c/0x150 [ 723.718202][ T4134] mount_bdev+0xff/0x3c0 [ 723.722463][ T4134] ? udf_load_vrs+0xc80/0xc80 [ 723.727157][ T4134] udf_mount+0x35/0x40 [ 723.731238][ T4134] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 723.736713][ T4134] legacy_get_tree+0xf2/0x200 [ 723.741417][ T4134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.747704][ T4134] vfs_get_tree+0x123/0x450 [ 723.752327][ T4134] do_mount+0x1436/0x2c40 [ 723.756676][ T4134] ? copy_mount_string+0x40/0x40 22:54:16 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x5, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000044000), 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0xfffffffffffffffd) getrandom(0x0, 0x0, 0x3) recvmmsg(r0, &(0x7f0000003740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x100, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) tkill(0x0, 0x0) [ 723.761636][ T4134] ? _copy_from_user+0xdd/0x150 [ 723.766502][ T4134] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.772759][ T4134] ? copy_mount_options+0x280/0x3a0 [ 723.777978][ T4134] ksys_mount+0xdb/0x150 [ 723.782243][ T4134] __x64_sys_mount+0xbe/0x150 [ 723.786949][ T4134] do_syscall_64+0x103/0x610 [ 723.791098][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 723.791556][ T4134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.791570][ T4134] RIP: 0033:0x458209 [ 723.791587][ T4134] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 723.791602][ T4134] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 723.797365][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 723.803206][ T4134] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 723.803215][ T4134] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 22:54:16 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:16 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) dup2(r0, r0) [ 723.803222][ T4134] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 723.803230][ T4134] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 723.803237][ T4134] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:16 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x6, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:16 executing program 0 (fault-call:1 fault-nth:27): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:16 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) 22:54:16 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:16 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) semget$private(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000500)=[{{&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x59, 0x0}}], 0x1, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x0, 0x0, 0x0) 22:54:16 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:17 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x7, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) [ 724.175126][ T4843] FAULT_INJECTION: forcing a failure. [ 724.175126][ T4843] name failslab, interval 1, probability 0, space 0, times 0 22:54:17 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 724.219669][ T4843] CPU: 1 PID: 4843 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 724.227532][ T4843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.237603][ T4843] Call Trace: [ 724.240937][ T4843] dump_stack+0x172/0x1f0 [ 724.245305][ T4843] should_fail.cold+0xa/0x15 [ 724.249923][ T4843] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 724.255757][ T4843] ? ___might_sleep+0x163/0x280 [ 724.260638][ T4843] __should_failslab+0x121/0x190 [ 724.265595][ T4843] should_failslab+0x9/0x14 [ 724.265613][ T4843] kmem_cache_alloc_trace+0x2d1/0x760 [ 724.265632][ T4843] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 724.265653][ T4843] __memcg_init_list_lru_node+0x8a/0x1e0 [ 724.265678][ T4843] __list_lru_init+0x3cf/0x6e0 [ 724.275558][ T4843] alloc_super+0x762/0x890 [ 724.275573][ T4843] ? test_single_super+0x10/0x10 [ 724.275588][ T4843] sget_userns+0xf1/0x560 [ 724.275601][ T4843] ? kill_litter_super+0x60/0x60 [ 724.275616][ T4843] ? test_single_super+0x10/0x10 [ 724.275628][ T4843] ? kill_litter_super+0x60/0x60 [ 724.275642][ T4843] sget+0x10c/0x150 [ 724.275660][ T4843] mount_bdev+0xff/0x3c0 [ 724.275684][ T4843] ? udf_load_vrs+0xc80/0xc80 [ 724.333134][ T4843] udf_mount+0x35/0x40 [ 724.337222][ T4843] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 724.342703][ T4843] legacy_get_tree+0xf2/0x200 [ 724.347399][ T4843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.353661][ T4843] vfs_get_tree+0x123/0x450 [ 724.358179][ T4843] do_mount+0x1436/0x2c40 [ 724.362522][ T4843] ? copy_mount_string+0x40/0x40 22:54:17 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:17 executing program 5: r0 = socket(0xa, 0x1, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl(r0, 0xc0189436, &(0x7f0000000000)) [ 724.367474][ T4843] ? _copy_from_user+0xdd/0x150 [ 724.372351][ T4843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.378608][ T4843] ? copy_mount_options+0x280/0x3a0 [ 724.383843][ T4843] ksys_mount+0xdb/0x150 [ 724.388105][ T4843] __x64_sys_mount+0xbe/0x150 [ 724.392801][ T4843] do_syscall_64+0x103/0x610 [ 724.397415][ T4843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.403334][ T4843] RIP: 0033:0x458209 [ 724.407241][ T4843] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 724.426957][ T4843] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 724.435394][ T4843] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 724.443391][ T4843] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 724.451385][ T4843] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 724.459382][ T4843] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:17 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xa, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='system.posix_acl_access\x00') [ 724.467399][ T4843] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:17 executing program 0 (fault-call:1 fault-nth:28): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:17 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:17 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$addseals(r0, 0x409, 0x0) 22:54:17 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x16) tkill(r0, 0x80000000002a) ptrace$cont(0x18, r0, 0x0, 0x0) 22:54:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x1100081) io_setup(0x3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 22:54:17 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 22:54:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_mreqsrc(r1, 0x0, 0x2, 0x0, 0x0) ptrace(0x20000000000010, r2) fcntl$setstatus(r1, 0x4, 0x42803) 22:54:17 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xe, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:17 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 724.787445][ T5462] FAULT_INJECTION: forcing a failure. [ 724.787445][ T5462] name failslab, interval 1, probability 0, space 0, times 0 [ 724.812921][ T5462] CPU: 1 PID: 5462 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 724.820819][ T5462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.830896][ T5462] Call Trace: 22:54:17 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 724.834227][ T5462] dump_stack+0x172/0x1f0 [ 724.838586][ T5462] should_fail.cold+0xa/0x15 [ 724.843205][ T5462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 724.849041][ T5462] ? ___might_sleep+0x163/0x280 [ 724.853912][ T5462] __should_failslab+0x121/0x190 [ 724.858872][ T5462] should_failslab+0x9/0x14 [ 724.863394][ T5462] kmem_cache_alloc_trace+0x2d1/0x760 [ 724.868797][ T5462] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 724.874635][ T5462] __memcg_init_list_lru_node+0x8a/0x1e0 [ 724.880310][ T5462] __list_lru_init+0x3cf/0x6e0 [ 724.885105][ T5462] alloc_super+0x762/0x890 [ 724.890024][ T5462] ? test_single_super+0x10/0x10 [ 724.895074][ T5462] sget_userns+0xf1/0x560 [ 724.899427][ T5462] ? kill_litter_super+0x60/0x60 [ 724.904390][ T5462] ? test_single_super+0x10/0x10 [ 724.909349][ T5462] ? kill_litter_super+0x60/0x60 [ 724.914317][ T5462] sget+0x10c/0x150 [ 724.918147][ T5462] mount_bdev+0xff/0x3c0 [ 724.922404][ T5462] ? udf_load_vrs+0xc80/0xc80 [ 724.927099][ T5462] udf_mount+0x35/0x40 [ 724.931188][ T5462] ? udf_get_pblock_meta25+0x3a0/0x3a0 22:54:17 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xf, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:17 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 724.936669][ T5462] legacy_get_tree+0xf2/0x200 [ 724.941370][ T5462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.947628][ T5462] vfs_get_tree+0x123/0x450 [ 724.952151][ T5462] do_mount+0x1436/0x2c40 [ 724.956512][ T5462] ? copy_mount_string+0x40/0x40 [ 724.961473][ T5462] ? _copy_from_user+0xdd/0x150 [ 724.966344][ T5462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.972605][ T5462] ? copy_mount_options+0x280/0x3a0 [ 724.977833][ T5462] ksys_mount+0xdb/0x150 [ 724.982094][ T5462] __x64_sys_mount+0xbe/0x150 [ 724.986794][ T5462] do_syscall_64+0x103/0x610 [ 724.991412][ T5462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.997332][ T5462] RIP: 0033:0x458209 [ 725.001237][ T5462] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.020863][ T5462] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 725.029313][ T5462] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 725.037319][ T5462] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 725.045322][ T5462] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 725.053319][ T5462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 725.061314][ T5462] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:18 executing program 0 (fault-call:1 fault-nth:29): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:18 executing program 1: write$selinux_attr(0xffffffffffffffff, 0x0, 0x7c) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) 22:54:18 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x11, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 725.250489][ T5916] FAULT_INJECTION: forcing a failure. [ 725.250489][ T5916] name failslab, interval 1, probability 0, space 0, times 0 [ 725.269574][ T5916] CPU: 0 PID: 5916 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 725.277428][ T5916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.287509][ T5916] Call Trace: [ 725.290833][ T5916] dump_stack+0x172/0x1f0 [ 725.295196][ T5916] should_fail.cold+0xa/0x15 [ 725.299823][ T5916] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 725.305652][ T5916] ? ___might_sleep+0x163/0x280 [ 725.310524][ T5916] __should_failslab+0x121/0x190 [ 725.315486][ T5916] should_failslab+0x9/0x14 [ 725.320006][ T5916] kmem_cache_alloc_trace+0x2d1/0x760 [ 725.325401][ T5916] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 725.331230][ T5916] __memcg_init_list_lru_node+0x8a/0x1e0 [ 725.336973][ T5916] __list_lru_init+0x3cf/0x6e0 [ 725.341749][ T5916] alloc_super+0x762/0x890 [ 725.346168][ T5916] ? test_single_super+0x10/0x10 [ 725.351113][ T5916] sget_userns+0xf1/0x560 [ 725.355447][ T5916] ? kill_litter_super+0x60/0x60 [ 725.360391][ T5916] ? test_single_super+0x10/0x10 [ 725.365335][ T5916] ? kill_litter_super+0x60/0x60 [ 725.370276][ T5916] sget+0x10c/0x150 [ 725.374107][ T5916] mount_bdev+0xff/0x3c0 [ 725.378359][ T5916] ? udf_load_vrs+0xc80/0xc80 [ 725.383047][ T5916] udf_mount+0x35/0x40 [ 725.387129][ T5916] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 725.392593][ T5916] legacy_get_tree+0xf2/0x200 [ 725.397278][ T5916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.403538][ T5916] vfs_get_tree+0x123/0x450 [ 725.408049][ T5916] do_mount+0x1436/0x2c40 [ 725.412389][ T5916] ? copy_mount_string+0x40/0x40 [ 725.417339][ T5916] ? _copy_from_user+0xdd/0x150 [ 725.422201][ T5916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.428460][ T5916] ? copy_mount_options+0x280/0x3a0 [ 725.433670][ T5916] ksys_mount+0xdb/0x150 [ 725.437919][ T5916] __x64_sys_mount+0xbe/0x150 [ 725.442603][ T5916] do_syscall_64+0x103/0x610 [ 725.447201][ T5916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.453096][ T5916] RIP: 0033:0x458209 [ 725.456994][ T5916] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.476607][ T5916] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 725.485034][ T5916] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 725.493009][ T5916] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 725.500987][ T5916] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 725.508966][ T5916] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 725.516942][ T5916] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:20 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x0) 22:54:20 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 22:54:20 executing program 1: write$selinux_attr(0xffffffffffffffff, 0x0, 0x7c) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) 22:54:20 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x18, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) dup3(r0, r0, 0x80000) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e23, @broadcast}}, 0x0, 0x0, 0x0, "b92561393e1b5be34edcdf7e79e1d9ff207834bf2312df8ecc1d1bc16f2c705b0de56c79b87f86284975e16a02d30478835036af693a934721cccbeb25f1490ee92d398f71c857b9165d8013e692c8d3"}, 0xd8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000440)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) link(0x0, &(0x7f00000001c0)='./file0\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1c, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000013, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ftruncate(r2, 0x39f) sendfile(r1, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 22:54:20 executing program 0 (fault-call:1 fault-nth:30): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 727.631251][ C0] net_ratelimit: 20 callbacks suppressed [ 727.631262][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 727.642783][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:20 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 727.718998][ T6098] FAULT_INJECTION: forcing a failure. [ 727.718998][ T6098] name failslab, interval 1, probability 0, space 0, times 0 [ 727.813279][ T6098] CPU: 1 PID: 6098 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 727.821155][ T6098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.831231][ T6098] Call Trace: [ 727.834548][ T6098] dump_stack+0x172/0x1f0 [ 727.838905][ T6098] should_fail.cold+0xa/0x15 [ 727.843525][ T6098] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 727.849363][ T6098] ? ___might_sleep+0x163/0x280 [ 727.854244][ T6098] __should_failslab+0x121/0x190 [ 727.859211][ T6098] should_failslab+0x9/0x14 [ 727.863730][ T6098] kmem_cache_alloc_trace+0x2d1/0x760 [ 727.869137][ T6098] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 727.875055][ T6098] __memcg_init_list_lru_node+0x8a/0x1e0 [ 727.880707][ T6098] __list_lru_init+0x3cf/0x6e0 [ 727.885489][ T6098] alloc_super+0x762/0x890 [ 727.890863][ T6098] ? test_single_super+0x10/0x10 [ 727.895820][ T6098] sget_userns+0xf1/0x560 [ 727.900154][ T6098] ? kill_litter_super+0x60/0x60 [ 727.905100][ T6098] ? test_single_super+0x10/0x10 [ 727.910043][ T6098] ? kill_litter_super+0x60/0x60 [ 727.914986][ T6098] sget+0x10c/0x150 [ 727.918802][ T6098] mount_bdev+0xff/0x3c0 [ 727.923095][ T6098] ? udf_load_vrs+0xc80/0xc80 [ 727.927784][ T6098] udf_mount+0x35/0x40 [ 727.931860][ T6098] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 727.937334][ T6098] legacy_get_tree+0xf2/0x200 [ 727.942020][ T6098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.948269][ T6098] vfs_get_tree+0x123/0x450 [ 727.952786][ T6098] do_mount+0x1436/0x2c40 [ 727.957135][ T6098] ? copy_mount_string+0x40/0x40 [ 727.962083][ T6098] ? _copy_from_user+0xdd/0x150 [ 727.966945][ T6098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.973212][ T6098] ? copy_mount_options+0x280/0x3a0 [ 727.978428][ T6098] ksys_mount+0xdb/0x150 [ 727.982718][ T6098] __x64_sys_mount+0xbe/0x150 [ 727.987421][ T6098] do_syscall_64+0x103/0x610 [ 727.992037][ T6098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.997940][ T6098] RIP: 0033:0x458209 [ 728.001847][ T6098] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 728.021459][ T6098] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 728.029898][ T6098] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 728.037879][ T6098] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 728.045854][ T6098] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 728.053850][ T6098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x15555555555555b5, 0x0, 0x0, 0x8a) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x3, 0x400, 0x0, 0x0, 0x0, 0x4cb]}) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0x0, 0x8}, 0x20) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:54:20 executing program 1: timerfd_create(0x7, 0x0) [ 728.061828][ T6098] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 728.070153][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 728.076007][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:21 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfc, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:21 executing program 3: [ 728.191060][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 728.196940][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:21 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 22:54:21 executing program 3: fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r0, 0x0, 0x0) r1 = creat(0x0, 0x0) creat(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x0) fdatasync(r0) 22:54:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername$netlink(r0, 0x0, &(0x7f0000000080)) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0xfffffffffffffeb8) close(r1) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x80c, 0x4) 22:54:21 executing program 0 (fault-call:1 fault-nth:31): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:21 executing program 4: r0 = gettid() inotify_init1(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0xe8) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) 22:54:21 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x12c, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:21 executing program 5: socketpair$unix(0x1, 0x20000007, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) write$P9_ROPEN(r0, 0x0, 0x1c4) [ 728.506028][ T6737] FAULT_INJECTION: forcing a failure. [ 728.506028][ T6737] name failslab, interval 1, probability 0, space 0, times 0 [ 728.587583][ T6737] CPU: 0 PID: 6737 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 728.595443][ T6737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.605547][ T6737] Call Trace: [ 728.608872][ T6737] dump_stack+0x172/0x1f0 [ 728.613246][ T6737] should_fail.cold+0xa/0x15 [ 728.617913][ T6737] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 728.623748][ T6737] ? ___might_sleep+0x163/0x280 [ 728.628622][ T6737] __should_failslab+0x121/0x190 [ 728.633591][ T6737] should_failslab+0x9/0x14 [ 728.638117][ T6737] kmem_cache_alloc_trace+0x2d1/0x760 [ 728.643529][ T6737] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 728.649365][ T6737] __memcg_init_list_lru_node+0x8a/0x1e0 [ 728.655015][ T6737] __list_lru_init+0x3cf/0x6e0 [ 728.659797][ T6737] alloc_super+0x762/0x890 [ 728.664225][ T6737] ? test_single_super+0x10/0x10 [ 728.669174][ T6737] sget_userns+0xf1/0x560 [ 728.673515][ T6737] ? kill_litter_super+0x60/0x60 [ 728.678467][ T6737] ? test_single_super+0x10/0x10 [ 728.683413][ T6737] ? kill_litter_super+0x60/0x60 [ 728.688363][ T6737] sget+0x10c/0x150 [ 728.692188][ T6737] mount_bdev+0xff/0x3c0 [ 728.696438][ T6737] ? udf_load_vrs+0xc80/0xc80 [ 728.701134][ T6737] udf_mount+0x35/0x40 [ 728.705212][ T6737] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 728.714345][ T6737] legacy_get_tree+0xf2/0x200 [ 728.719043][ T6737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.725315][ T6737] vfs_get_tree+0x123/0x450 [ 728.729828][ T6737] do_mount+0x1436/0x2c40 22:54:21 executing program 5: 22:54:21 executing program 5: [ 728.734258][ T6737] ? copy_mount_string+0x40/0x40 [ 728.739221][ T6737] ? _copy_from_user+0xdd/0x150 [ 728.744091][ T6737] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.750344][ T6737] ? copy_mount_options+0x280/0x3a0 [ 728.755584][ T6737] ksys_mount+0xdb/0x150 [ 728.761357][ T6737] __x64_sys_mount+0xbe/0x150 [ 728.766060][ T6737] do_syscall_64+0x103/0x610 [ 728.770666][ T6737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.776588][ T6737] RIP: 0033:0x458209 22:54:21 executing program 1: [ 728.780493][ T6737] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 728.800113][ T6737] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 728.808550][ T6737] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 728.816539][ T6737] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 728.824548][ T6737] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:54:21 executing program 4: 22:54:21 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x14c, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:21 executing program 3: 22:54:21 executing program 5: [ 728.832662][ T6737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 728.840652][ T6737] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 728.848936][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 728.854781][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 728.860749][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 728.866604][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:21 executing program 1: 22:54:21 executing program 0 (fault-call:1 fault-nth:32): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:21 executing program 5: 22:54:21 executing program 3: 22:54:21 executing program 4: 22:54:21 executing program 1: 22:54:21 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x1f4, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:22 executing program 5: [ 729.130530][ T7353] FAULT_INJECTION: forcing a failure. [ 729.130530][ T7353] name failslab, interval 1, probability 0, space 0, times 0 [ 729.158076][ T7353] CPU: 0 PID: 7353 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 729.165957][ T7353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.176028][ T7353] Call Trace: 22:54:22 executing program 1: [ 729.179349][ T7353] dump_stack+0x172/0x1f0 [ 729.183710][ T7353] should_fail.cold+0xa/0x15 [ 729.188353][ T7353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 729.194189][ T7353] ? ___might_sleep+0x163/0x280 [ 729.199057][ T7353] __should_failslab+0x121/0x190 [ 729.204015][ T7353] should_failslab+0x9/0x14 [ 729.208538][ T7353] kmem_cache_alloc_trace+0x2d1/0x760 [ 729.213931][ T7353] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 729.219764][ T7353] __memcg_init_list_lru_node+0x8a/0x1e0 [ 729.225426][ T7353] __list_lru_init+0x3cf/0x6e0 22:54:22 executing program 5: 22:54:22 executing program 4: [ 729.230215][ T7353] alloc_super+0x762/0x890 [ 729.234650][ T7353] ? test_single_super+0x10/0x10 [ 729.239603][ T7353] sget_userns+0xf1/0x560 [ 729.243953][ T7353] ? kill_litter_super+0x60/0x60 [ 729.249002][ T7353] ? test_single_super+0x10/0x10 [ 729.253952][ T7353] ? kill_litter_super+0x60/0x60 [ 729.258902][ T7353] sget+0x10c/0x150 [ 729.262728][ T7353] mount_bdev+0xff/0x3c0 [ 729.266980][ T7353] ? udf_load_vrs+0xc80/0xc80 [ 729.267001][ T7353] udf_mount+0x35/0x40 [ 729.267026][ T7353] ? udf_get_pblock_meta25+0x3a0/0x3a0 22:54:22 executing program 3: [ 729.281240][ T7353] legacy_get_tree+0xf2/0x200 [ 729.285945][ T7353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.285965][ T7353] vfs_get_tree+0x123/0x450 [ 729.285984][ T7353] do_mount+0x1436/0x2c40 [ 729.301075][ T7353] ? copy_mount_string+0x40/0x40 [ 729.306037][ T7353] ? _copy_from_user+0xdd/0x150 [ 729.310912][ T7353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.317176][ T7353] ? copy_mount_options+0x280/0x3a0 [ 729.322396][ T7353] ksys_mount+0xdb/0x150 [ 729.326654][ T7353] __x64_sys_mount+0xbe/0x150 22:54:22 executing program 1: [ 729.331357][ T7353] do_syscall_64+0x103/0x610 [ 729.335969][ T7353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.341872][ T7353] RIP: 0033:0x458209 [ 729.345779][ T7353] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 729.365397][ T7353] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 729.373837][ T7353] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 729.381824][ T7353] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 729.389838][ T7353] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 729.397821][ T7353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 729.405803][ T7353] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:22 executing program 1: 22:54:22 executing program 3: 22:54:22 executing program 0 (fault-call:1 fault-nth:33): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:22 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x300, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:22 executing program 4: 22:54:22 executing program 5: 22:54:22 executing program 4: 22:54:22 executing program 5: 22:54:22 executing program 3: 22:54:22 executing program 1: [ 729.653808][ T7513] FAULT_INJECTION: forcing a failure. [ 729.653808][ T7513] name failslab, interval 1, probability 0, space 0, times 0 [ 729.667214][ T7513] CPU: 0 PID: 7513 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 729.675035][ T7513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.685101][ T7513] Call Trace: [ 729.688416][ T7513] dump_stack+0x172/0x1f0 [ 729.692762][ T7513] should_fail.cold+0xa/0x15 [ 729.697370][ T7513] ? fault_create_debugfs_attr+0x1e0/0x1e0 22:54:22 executing program 4: [ 729.703196][ T7513] ? ___might_sleep+0x163/0x280 [ 729.708060][ T7513] __should_failslab+0x121/0x190 [ 729.713014][ T7513] should_failslab+0x9/0x14 [ 729.717525][ T7513] __kmalloc+0x2dc/0x740 [ 729.721795][ T7513] ? __list_lru_init+0xd1/0x6e0 [ 729.726663][ T7513] __list_lru_init+0xd1/0x6e0 [ 729.731361][ T7513] alloc_super+0x78d/0x890 [ 729.735791][ T7513] ? test_single_super+0x10/0x10 [ 729.740736][ T7513] sget_userns+0xf1/0x560 [ 729.745082][ T7513] ? kill_litter_super+0x60/0x60 [ 729.750096][ T7513] ? test_single_super+0x10/0x10 [ 729.755055][ T7513] ? kill_litter_super+0x60/0x60 [ 729.760509][ T7513] sget+0x10c/0x150 [ 729.764344][ T7513] mount_bdev+0xff/0x3c0 [ 729.768613][ T7513] ? udf_load_vrs+0xc80/0xc80 [ 729.773330][ T7513] udf_mount+0x35/0x40 [ 729.777410][ T7513] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 729.782887][ T7513] legacy_get_tree+0xf2/0x200 [ 729.787574][ T7513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.793831][ T7513] vfs_get_tree+0x123/0x450 [ 729.798350][ T7513] do_mount+0x1436/0x2c40 22:54:22 executing program 4: [ 729.802693][ T7513] ? copy_mount_string+0x40/0x40 [ 729.807643][ T7513] ? _copy_from_user+0xdd/0x150 [ 729.812507][ T7513] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.818752][ T7513] ? copy_mount_options+0x280/0x3a0 [ 729.823956][ T7513] ksys_mount+0xdb/0x150 [ 729.828212][ T7513] __x64_sys_mount+0xbe/0x150 [ 729.832901][ T7513] do_syscall_64+0x103/0x610 [ 729.837504][ T7513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.843403][ T7513] RIP: 0033:0x458209 [ 729.847323][ T7513] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 729.866942][ T7513] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 729.875370][ T7513] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 729.883361][ T7513] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 729.891958][ T7513] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 729.899949][ T7513] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 729.908026][ T7513] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:22 executing program 0 (fault-call:1 fault-nth:34): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:22 executing program 5: 22:54:22 executing program 4: 22:54:22 executing program 1: 22:54:22 executing program 3: 22:54:22 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x3e8, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:22 executing program 5: 22:54:22 executing program 4: 22:54:23 executing program 1: 22:54:23 executing program 3: [ 730.119545][ T7592] FAULT_INJECTION: forcing a failure. [ 730.119545][ T7592] name failslab, interval 1, probability 0, space 0, times 0 [ 730.180375][ T7592] CPU: 1 PID: 7592 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 730.188231][ T7592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.198313][ T7592] Call Trace: [ 730.201636][ T7592] dump_stack+0x172/0x1f0 [ 730.205995][ T7592] should_fail.cold+0xa/0x15 [ 730.206021][ T7592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 730.206047][ T7592] ? ___might_sleep+0x163/0x280 [ 730.216455][ T7592] __should_failslab+0x121/0x190 [ 730.216474][ T7592] should_failslab+0x9/0x14 [ 730.216488][ T7592] kmem_cache_alloc_trace+0x2d1/0x760 [ 730.216505][ T7592] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 730.216526][ T7592] __memcg_init_list_lru_node+0x8a/0x1e0 [ 730.216546][ T7592] __list_lru_init+0x3cf/0x6e0 [ 730.252425][ T7592] alloc_super+0x762/0x890 [ 730.256867][ T7592] ? test_single_super+0x10/0x10 [ 730.261832][ T7592] sget_userns+0xf1/0x560 [ 730.266179][ T7592] ? kill_litter_super+0x60/0x60 [ 730.271132][ T7592] ? test_single_super+0x10/0x10 [ 730.276089][ T7592] ? kill_litter_super+0x60/0x60 [ 730.281048][ T7592] sget+0x10c/0x150 [ 730.284881][ T7592] mount_bdev+0xff/0x3c0 [ 730.289144][ T7592] ? udf_load_vrs+0xc80/0xc80 [ 730.293849][ T7592] udf_mount+0x35/0x40 [ 730.297937][ T7592] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 730.303420][ T7592] legacy_get_tree+0xf2/0x200 [ 730.308120][ T7592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.314386][ T7592] vfs_get_tree+0x123/0x450 [ 730.318914][ T7592] do_mount+0x1436/0x2c40 [ 730.323268][ T7592] ? copy_mount_string+0x40/0x40 22:54:23 executing program 4: 22:54:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) [ 730.328230][ T7592] ? _copy_from_user+0xdd/0x150 [ 730.333098][ T7592] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 730.339375][ T7592] ? copy_mount_options+0x280/0x3a0 [ 730.344771][ T7592] ksys_mount+0xdb/0x150 [ 730.349044][ T7592] __x64_sys_mount+0xbe/0x150 [ 730.353746][ T7592] do_syscall_64+0x103/0x610 [ 730.358363][ T7592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.364269][ T7592] RIP: 0033:0x458209 [ 730.368189][ T7592] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.387805][ T7592] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 730.396238][ T7592] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 730.404227][ T7592] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 730.412214][ T7592] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 730.420198][ T7592] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 730.420208][ T7592] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:23 executing program 0 (fault-call:1 fault-nth:35): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 22:54:23 executing program 4: mknodat(0xffffffffffffffff, 0x0, 0x7000, 0x0) 22:54:23 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) read$alg(r0, 0x0, 0x0) 22:54:23 executing program 5: 22:54:23 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x500, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:23 executing program 5: 22:54:23 executing program 4: [ 730.615058][ T7992] FAULT_INJECTION: forcing a failure. [ 730.615058][ T7992] name failslab, interval 1, probability 0, space 0, times 0 [ 730.694706][ T7992] CPU: 0 PID: 7992 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 730.702666][ T7992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.714245][ T7992] Call Trace: [ 730.717563][ T7992] dump_stack+0x172/0x1f0 [ 730.721912][ T7992] should_fail.cold+0xa/0x15 [ 730.727044][ T7992] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 730.732872][ T7992] ? ___might_sleep+0x163/0x280 [ 730.737746][ T7992] __should_failslab+0x121/0x190 22:54:23 executing program 5: 22:54:23 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x600, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:23 executing program 4: [ 730.742708][ T7992] should_failslab+0x9/0x14 [ 730.747225][ T7992] kmem_cache_alloc_trace+0x2d1/0x760 [ 730.752621][ T7992] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 730.759078][ T7992] __memcg_init_list_lru_node+0x8a/0x1e0 [ 730.764728][ T7992] __list_lru_init+0x3cf/0x6e0 [ 730.769509][ T7992] alloc_super+0x78d/0x890 [ 730.773946][ T7992] ? test_single_super+0x10/0x10 [ 730.778903][ T7992] sget_userns+0xf1/0x560 [ 730.783370][ T7992] ? kill_litter_super+0x60/0x60 [ 730.788347][ T7992] ? test_single_super+0x10/0x10 [ 730.793327][ T7992] ? kill_litter_super+0x60/0x60 [ 730.798299][ T7992] sget+0x10c/0x150 [ 730.802132][ T7992] mount_bdev+0xff/0x3c0 [ 730.806453][ T7992] ? udf_load_vrs+0xc80/0xc80 [ 730.811168][ T7992] udf_mount+0x35/0x40 [ 730.815255][ T7992] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 730.820739][ T7992] legacy_get_tree+0xf2/0x200 [ 730.825427][ T7992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.831677][ T7992] vfs_get_tree+0x123/0x450 [ 730.836192][ T7992] do_mount+0x1436/0x2c40 [ 730.840550][ T7992] ? copy_mount_string+0x40/0x40 22:54:23 executing program 4: [ 730.845593][ T7992] ? _copy_from_user+0xdd/0x150 [ 730.850461][ T7992] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 730.856710][ T7992] ? copy_mount_options+0x280/0x3a0 [ 730.861922][ T7992] ksys_mount+0xdb/0x150 [ 730.866175][ T7992] __x64_sys_mount+0xbe/0x150 [ 730.870963][ T7992] do_syscall_64+0x103/0x610 [ 730.875575][ T7992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.881513][ T7992] RIP: 0033:0x458209 [ 730.885449][ T7992] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.905073][ T7992] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 730.913500][ T7992] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 730.921481][ T7992] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 730.929465][ T7992] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 730.937450][ T7992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:23 executing program 0 (fault-call:1 fault-nth:36): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:23 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x700, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:23 executing program 5: [ 730.945521][ T7992] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:23 executing program 3: 22:54:23 executing program 1: 22:54:23 executing program 4: 22:54:23 executing program 5: 22:54:23 executing program 1: 22:54:24 executing program 4: [ 731.133593][ T8282] FAULT_INJECTION: forcing a failure. [ 731.133593][ T8282] name failslab, interval 1, probability 0, space 0, times 0 22:54:24 executing program 5: 22:54:24 executing program 3: [ 731.228912][ T8282] CPU: 0 PID: 8282 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 731.236800][ T8282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.247047][ T8282] Call Trace: [ 731.250364][ T8282] dump_stack+0x172/0x1f0 [ 731.254807][ T8282] should_fail.cold+0xa/0x15 [ 731.259426][ T8282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.265256][ T8282] ? ___might_sleep+0x163/0x280 [ 731.270138][ T8282] __should_failslab+0x121/0x190 [ 731.275096][ T8282] should_failslab+0x9/0x14 [ 731.279614][ T8282] kmem_cache_alloc_trace+0x2d1/0x760 [ 731.285002][ T8282] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 731.290831][ T8282] __memcg_init_list_lru_node+0x8a/0x1e0 [ 731.296493][ T8282] __list_lru_init+0x3cf/0x6e0 [ 731.301279][ T8282] alloc_super+0x78d/0x890 [ 731.305723][ T8282] ? test_single_super+0x10/0x10 [ 731.310692][ T8282] sget_userns+0xf1/0x560 [ 731.315027][ T8282] ? kill_litter_super+0x60/0x60 [ 731.319994][ T8282] ? test_single_super+0x10/0x10 22:54:24 executing program 3: [ 731.324943][ T8282] ? kill_litter_super+0x60/0x60 [ 731.329888][ T8282] sget+0x10c/0x150 [ 731.333713][ T8282] mount_bdev+0xff/0x3c0 [ 731.337986][ T8282] ? udf_load_vrs+0xc80/0xc80 [ 731.342687][ T8282] udf_mount+0x35/0x40 [ 731.346770][ T8282] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 731.352242][ T8282] legacy_get_tree+0xf2/0x200 [ 731.356929][ T8282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.363269][ T8282] vfs_get_tree+0x123/0x450 [ 731.367805][ T8282] do_mount+0x1436/0x2c40 [ 731.372157][ T8282] ? copy_mount_string+0x40/0x40 [ 731.377113][ T8282] ? _copy_from_user+0xdd/0x150 [ 731.382024][ T8282] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.388325][ T8282] ? copy_mount_options+0x280/0x3a0 [ 731.393555][ T8282] ksys_mount+0xdb/0x150 [ 731.397823][ T8282] __x64_sys_mount+0xbe/0x150 [ 731.402629][ T8282] do_syscall_64+0x103/0x610 [ 731.407251][ T8282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.413678][ T8282] RIP: 0033:0x458209 [ 731.417767][ T8282] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.440445][ T8282] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 731.448937][ T8282] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 731.456922][ T8282] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 731.464889][ T8282] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:54:24 executing program 0 (fault-call:1 fault-nth:37): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xa00, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:24 executing program 5: 22:54:24 executing program 1: 22:54:24 executing program 3: 22:54:24 executing program 4: [ 731.472866][ T8282] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 731.480847][ T8282] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:24 executing program 4: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x42ede9d3c093c917) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) socketpair(0x10, 0x7, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x118) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7fff) r3 = getpid() getpid() fcntl$getownex(r2, 0x10, &(0x7f0000000140)) r4 = fcntl$getown(r2, 0x9) r5 = syz_open_procfs(r4, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpgid(r3) getsockopt$inet_udp_int(r5, 0x11, 0x6f, &(0x7f0000000180), &(0x7f0000000200)=0xfffffffffffffd3f) socketpair$unix(0x1, 0x2007, 0x0, 0x0) setgroups(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) bind$inet6(r6, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfff7fffffffffffd) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000040)=0x1, 0xffffffea) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r8, 0x0, 0x48a, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r8, 0x80003) sendfile(r6, r8, &(0x7f00000000c0), 0x8000fffffffe) recvmmsg(r7, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 22:54:24 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r6, 0x4, 0x40400) write$FUSE_WRITE(r6, &(0x7f0000000080)={0x18}, 0x18) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 22:54:24 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) [ 731.642459][ T8389] FAULT_INJECTION: forcing a failure. [ 731.642459][ T8389] name failslab, interval 1, probability 0, space 0, times 0 [ 731.661230][ T8389] CPU: 1 PID: 8389 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 731.669106][ T8389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.679203][ T8389] Call Trace: [ 731.682525][ T8389] dump_stack+0x172/0x1f0 [ 731.686916][ T8389] should_fail.cold+0xa/0x15 [ 731.691573][ T8389] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.697515][ T8389] ? ___might_sleep+0x163/0x280 [ 731.702478][ T8389] __should_failslab+0x121/0x190 [ 731.707530][ T8389] should_failslab+0x9/0x14 [ 731.712045][ T8389] kmem_cache_alloc_trace+0x2d1/0x760 [ 731.717451][ T8389] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 731.723832][ T8389] __memcg_init_list_lru_node+0x8a/0x1e0 [ 731.729495][ T8389] __list_lru_init+0x3cf/0x6e0 [ 731.734296][ T8389] alloc_super+0x78d/0x890 [ 731.738733][ T8389] ? test_single_super+0x10/0x10 [ 731.743694][ T8389] sget_userns+0xf1/0x560 [ 731.748045][ T8389] ? kill_litter_super+0x60/0x60 [ 731.753000][ T8389] ? test_single_super+0x10/0x10 [ 731.757973][ T8389] ? kill_litter_super+0x60/0x60 [ 731.762914][ T8389] sget+0x10c/0x150 [ 731.766747][ T8389] mount_bdev+0xff/0x3c0 [ 731.770998][ T8389] ? udf_load_vrs+0xc80/0xc80 [ 731.775686][ T8389] udf_mount+0x35/0x40 [ 731.779882][ T8389] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 731.785354][ T8389] legacy_get_tree+0xf2/0x200 [ 731.790045][ T8389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.796308][ T8389] vfs_get_tree+0x123/0x450 [ 731.800837][ T8389] do_mount+0x1436/0x2c40 [ 731.805193][ T8389] ? copy_mount_string+0x40/0x40 [ 731.810329][ T8389] ? _copy_from_user+0xdd/0x150 [ 731.815191][ T8389] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.821447][ T8389] ? copy_mount_options+0x280/0x3a0 [ 731.826657][ T8389] ksys_mount+0xdb/0x150 [ 731.831000][ T8389] __x64_sys_mount+0xbe/0x150 [ 731.835694][ T8389] do_syscall_64+0x103/0x610 [ 731.840390][ T8389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.846304][ T8389] RIP: 0033:0x458209 [ 731.850208][ T8389] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.869833][ T8389] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 731.878281][ T8389] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 22:54:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xe00, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:24 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 22:54:24 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}}], 0x0, 0x0, 0x0}) [ 731.886280][ T8389] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 731.895366][ T8389] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 731.903493][ T8389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 731.911503][ T8389] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:24 executing program 0 (fault-call:1 fault-nth:38): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:24 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) 22:54:24 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b8366716, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x800000000006, 0x0, 0x0, 0x0, 0x0) 22:54:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) [ 732.018113][ T8712] binder: 8694:8712 transaction failed 29189/-22, size 0-8 line 2994 [ 732.047969][ T8712] binder: 8694:8712 transaction failed 29189/-22, size 0-8 line 2994 22:54:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3805}) 22:54:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xf00, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 732.119524][ T8885] FAULT_INJECTION: forcing a failure. [ 732.119524][ T8885] name failslab, interval 1, probability 0, space 0, times 0 22:54:25 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b8366716, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) [ 732.226602][ T7819] binder: undelivered TRANSACTION_ERROR: 29189 [ 732.233723][ T7819] binder: undelivered TRANSACTION_ERROR: 29189 [ 732.262174][ T8885] CPU: 0 PID: 8885 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 22:54:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x1100, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 732.270145][ T8885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.280765][ T8885] Call Trace: [ 732.284112][ T8885] dump_stack+0x172/0x1f0 [ 732.288575][ T8885] should_fail.cold+0xa/0x15 [ 732.293185][ T8885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 732.299017][ T8885] ? ___might_sleep+0x163/0x280 [ 732.303885][ T8885] __should_failslab+0x121/0x190 [ 732.308929][ T8885] should_failslab+0x9/0x14 [ 732.313439][ T8885] kmem_cache_alloc_trace+0x2d1/0x760 [ 732.318825][ T8885] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 732.324652][ T8885] __memcg_init_list_lru_node+0x8a/0x1e0 [ 732.330319][ T8885] __list_lru_init+0x3cf/0x6e0 [ 732.335105][ T8885] alloc_super+0x78d/0x890 [ 732.339564][ T8885] ? test_single_super+0x10/0x10 [ 732.344509][ T8885] sget_userns+0xf1/0x560 [ 732.348845][ T8885] ? kill_litter_super+0x60/0x60 [ 732.353792][ T8885] ? test_single_super+0x10/0x10 [ 732.358823][ T8885] ? kill_litter_super+0x60/0x60 [ 732.363780][ T8885] sget+0x10c/0x150 [ 732.367777][ T8885] mount_bdev+0xff/0x3c0 [ 732.372025][ T8885] ? udf_load_vrs+0xc80/0xc80 22:54:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) [ 732.376713][ T8885] udf_mount+0x35/0x40 [ 732.381226][ T8885] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 732.386711][ T8885] legacy_get_tree+0xf2/0x200 [ 732.391401][ T8885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.397664][ T8885] vfs_get_tree+0x123/0x450 [ 732.402183][ T8885] do_mount+0x1436/0x2c40 [ 732.406709][ T8885] ? copy_mount_string+0x40/0x40 [ 732.411667][ T8885] ? _copy_from_user+0xdd/0x150 [ 732.416539][ T8885] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 732.422791][ T8885] ? copy_mount_options+0x280/0x3a0 [ 732.428010][ T8885] ksys_mount+0xdb/0x150 [ 732.432261][ T8885] __x64_sys_mount+0xbe/0x150 [ 732.437061][ T8885] do_syscall_64+0x103/0x610 [ 732.441685][ T8885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.447587][ T8885] RIP: 0033:0x458209 [ 732.451586][ T8885] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.471200][ T8885] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 732.479633][ T8885] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 732.488241][ T8885] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 732.496243][ T8885] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 732.504261][ T8885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 732.512265][ T8885] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x70a000) 22:54:25 executing program 0 (fault-call:1 fault-nth:39): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x1800, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) [ 732.823262][ T9616] FAULT_INJECTION: forcing a failure. [ 732.823262][ T9616] name failslab, interval 1, probability 0, space 0, times 0 [ 732.850028][ T9616] CPU: 0 PID: 9616 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 732.857889][ T9616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.867974][ T9616] Call Trace: 22:54:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x2000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 732.868004][ T9616] dump_stack+0x172/0x1f0 [ 732.868030][ T9616] should_fail.cold+0xa/0x15 [ 732.880345][ T9616] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 732.886263][ T9616] ? ___might_sleep+0x163/0x280 [ 732.891140][ T9616] __should_failslab+0x121/0x190 [ 732.896092][ T9616] should_failslab+0x9/0x14 [ 732.896111][ T9616] kmem_cache_alloc_trace+0x2d1/0x760 [ 732.896139][ T9616] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 732.911906][ T9616] __memcg_init_list_lru_node+0x8a/0x1e0 [ 732.917564][ T9616] __list_lru_init+0x3cf/0x6e0 [ 732.922355][ T9616] alloc_super+0x78d/0x890 [ 732.926781][ T9616] ? test_single_super+0x10/0x10 [ 732.931733][ T9616] sget_userns+0xf1/0x560 [ 732.936096][ T9616] ? kill_litter_super+0x60/0x60 [ 732.941041][ T9616] ? test_single_super+0x10/0x10 [ 732.946012][ T9616] ? kill_litter_super+0x60/0x60 [ 732.951049][ T9616] sget+0x10c/0x150 [ 732.954872][ T9616] mount_bdev+0xff/0x3c0 [ 732.959122][ T9616] ? udf_load_vrs+0xc80/0xc80 [ 732.963832][ T9616] udf_mount+0x35/0x40 [ 732.967910][ T9616] ? udf_get_pblock_meta25+0x3a0/0x3a0 22:54:25 executing program 3: capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)) msgget(0x2, 0x100) [ 732.967930][ T9616] legacy_get_tree+0xf2/0x200 [ 732.967952][ T9616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.984331][ T9616] vfs_get_tree+0x123/0x450 [ 732.984351][ T9616] do_mount+0x1436/0x2c40 [ 732.984375][ T9616] ? copy_mount_string+0x40/0x40 [ 732.998671][ T9616] ? _copy_from_user+0xdd/0x150 [ 733.003538][ T9616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 733.009800][ T9616] ? copy_mount_options+0x280/0x3a0 [ 733.015108][ T9616] ksys_mount+0xdb/0x150 [ 733.019371][ T9616] __x64_sys_mount+0xbe/0x150 22:54:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="fe8000000000000000000000000000aa0000000032000000fe8000000000000000000000000000bb0000000000000000000000000000000000040000000000000000000000000000000000000000000040eda0c101f1f3b0107b4218500000000000000000000000000000000000000000000000000000000000560000000000000000000000000000000000000000000000000000181d08000000000000000000000000000000000000000000e80c4327c0763da003a13e7000871748e0d9dbcf3331574d6edd06b03ea768b8e7a473500396fca157911bf195c192a028d3"], 0x1}}, 0x0) [ 733.024179][ T9616] do_syscall_64+0x103/0x610 [ 733.028955][ T9616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.034865][ T9616] RIP: 0033:0x458209 [ 733.038777][ T9616] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 733.058567][ T9616] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 733.067004][ T9616] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 733.075080][ T9616] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 733.083068][ T9616] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 733.091229][ T9616] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 733.099237][ T9616] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 733.107590][ C0] net_ratelimit: 20 callbacks suppressed [ 733.107599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 733.119088][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:26 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) 22:54:26 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f00000001c0), 0x4) r2 = open(&(0x7f00000034c0)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r0, r2, 0x0, 0x403) [ 733.124959][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 733.130731][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00000000000000000000000000", 0x58}], 0x1) 22:54:26 executing program 1: ioctl(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)) 22:54:26 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") dup3(r0, r1, 0x0) 22:54:26 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x2c01, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:26 executing program 0 (fault-call:1 fault-nth:40): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 733.311097][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 733.316999][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:26 executing program 1: ioctl(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)) 22:54:26 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000001d80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x420}}], 0x1, 0x0) [ 733.414016][T10022] FAULT_INJECTION: forcing a failure. [ 733.414016][T10022] name failslab, interval 1, probability 0, space 0, times 0 22:54:26 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) 22:54:26 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x4c01, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:26 executing program 1: ioctl(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)) [ 733.541245][T10022] CPU: 0 PID: 10022 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 733.549202][T10022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.559262][T10022] Call Trace: [ 733.562594][T10022] dump_stack+0x172/0x1f0 [ 733.567554][T10022] should_fail.cold+0xa/0x15 [ 733.572163][T10022] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 733.577984][T10022] ? ___might_sleep+0x163/0x280 [ 733.582854][T10022] __should_failslab+0x121/0x190 [ 733.587811][T10022] should_failslab+0x9/0x14 [ 733.592341][T10022] kmem_cache_alloc_trace+0x2d1/0x760 [ 733.597819][T10022] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 733.603639][T10022] __memcg_init_list_lru_node+0x8a/0x1e0 [ 733.609366][T10022] __list_lru_init+0x3cf/0x6e0 [ 733.614139][T10022] alloc_super+0x78d/0x890 [ 733.618557][T10022] ? test_single_super+0x10/0x10 [ 733.623582][T10022] sget_userns+0xf1/0x560 [ 733.627918][T10022] ? kill_litter_super+0x60/0x60 [ 733.632860][T10022] ? test_single_super+0x10/0x10 [ 733.637796][T10022] ? kill_litter_super+0x60/0x60 [ 733.642843][T10022] sget+0x10c/0x150 [ 733.646660][T10022] mount_bdev+0xff/0x3c0 [ 733.650906][T10022] ? udf_load_vrs+0xc80/0xc80 [ 733.655596][T10022] udf_mount+0x35/0x40 [ 733.659672][T10022] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 733.665131][T10022] legacy_get_tree+0xf2/0x200 [ 733.669832][T10022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.676085][T10022] vfs_get_tree+0x123/0x450 [ 733.680606][T10022] do_mount+0x1436/0x2c40 [ 733.684978][T10022] ? copy_mount_string+0x40/0x40 [ 733.690016][T10022] ? _copy_from_user+0xdd/0x150 [ 733.694875][T10022] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 733.701118][T10022] ? copy_mount_options+0x280/0x3a0 [ 733.706326][T10022] ksys_mount+0xdb/0x150 [ 733.710587][T10022] __x64_sys_mount+0xbe/0x150 [ 733.715281][T10022] do_syscall_64+0x103/0x610 [ 733.719888][T10022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.725779][T10022] RIP: 0033:0x458209 [ 733.729694][T10022] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 733.749568][T10022] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 733.758482][T10022] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 733.766466][T10022] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 733.774440][T10022] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 733.782597][T10022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:26 executing program 4: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) memfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 733.790572][T10022] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) 22:54:26 executing program 1: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) 22:54:26 executing program 0 (fault-call:1 fault-nth:41): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:26 executing program 3: socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) link(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1c, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000013, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ftruncate(r1, 0x39f) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) 22:54:26 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x80fe, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 734.031063][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 734.036965][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:26 executing program 1: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) [ 734.070920][T10673] FAULT_INJECTION: forcing a failure. [ 734.070920][T10673] name failslab, interval 1, probability 0, space 0, times 0 [ 734.121231][T10673] CPU: 0 PID: 10673 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 734.129196][T10673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.139273][T10673] Call Trace: [ 734.142612][T10673] dump_stack+0x172/0x1f0 [ 734.146962][T10673] should_fail.cold+0xa/0x15 [ 734.151588][T10673] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 734.157420][T10673] ? ___might_sleep+0x163/0x280 [ 734.162304][T10673] __should_failslab+0x121/0x190 [ 734.167265][T10673] should_failslab+0x9/0x14 22:54:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) 22:54:27 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() tgkill(r0, r0, 0x0) [ 734.171800][T10673] kmem_cache_alloc_trace+0x2d1/0x760 [ 734.177185][T10673] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 734.183016][T10673] __memcg_init_list_lru_node+0x8a/0x1e0 [ 734.188666][T10673] __list_lru_init+0x3cf/0x6e0 [ 734.193449][T10673] alloc_super+0x78d/0x890 [ 734.197895][T10673] ? test_single_super+0x10/0x10 [ 734.202844][T10673] sget_userns+0xf1/0x560 [ 734.207187][T10673] ? kill_litter_super+0x60/0x60 [ 734.212327][T10673] ? test_single_super+0x10/0x10 [ 734.217281][T10673] ? kill_litter_super+0x60/0x60 [ 734.222243][T10673] sget+0x10c/0x150 [ 734.226067][T10673] mount_bdev+0xff/0x3c0 [ 734.230338][T10673] ? udf_load_vrs+0xc80/0xc80 [ 734.235036][T10673] udf_mount+0x35/0x40 [ 734.239125][T10673] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 734.244597][T10673] legacy_get_tree+0xf2/0x200 [ 734.249303][T10673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.255574][T10673] vfs_get_tree+0x123/0x450 [ 734.260088][T10673] do_mount+0x1436/0x2c40 [ 734.264438][T10673] ? copy_mount_string+0x40/0x40 [ 734.269394][T10673] ? _copy_from_user+0xdd/0x150 [ 734.271078][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 734.274274][T10673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 734.274300][T10673] ? copy_mount_options+0x280/0x3a0 [ 734.274326][T10673] ksys_mount+0xdb/0x150 [ 734.274347][T10673] __x64_sys_mount+0xbe/0x150 [ 734.280307][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 734.286484][T10673] do_syscall_64+0x103/0x610 [ 734.286504][T10673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.286516][T10673] RIP: 0033:0x458209 [ 734.286531][T10673] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 734.286538][T10673] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 734.286551][T10673] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 734.286560][T10673] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 22:54:27 executing program 3: io_setup(0x80400000000002, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000080)='@u\x03\x00\x000\xa6\xc9\xf4\x89K\x16\xa6\xc1\xcc\xfcj\x97', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x100000000000011, r1, 0x0) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 734.286576][T10673] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 734.372815][T10673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 734.380800][T10673] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:27 executing program 1: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) 22:54:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) 22:54:27 executing program 0 (fault-call:1 fault-nth:42): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:27 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xc0fe, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:27 executing program 1: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) 22:54:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 734.605859][T11258] FAULT_INJECTION: forcing a failure. [ 734.605859][T11258] name failslab, interval 1, probability 0, space 0, times 0 [ 734.659332][T11258] CPU: 0 PID: 11258 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 734.667284][T11258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.677383][T11258] Call Trace: [ 734.680706][T11258] dump_stack+0x172/0x1f0 [ 734.685067][T11258] should_fail.cold+0xa/0x15 [ 734.689692][T11258] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 734.695529][T11258] ? ___might_sleep+0x163/0x280 [ 734.700413][T11258] __should_failslab+0x121/0x190 22:54:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000240)=0x5d, 0x40011) 22:54:27 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xe803, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 734.705557][T11258] should_failslab+0x9/0x14 [ 734.712359][T11258] kmem_cache_alloc_trace+0x2d1/0x760 [ 734.719959][T11258] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 734.726251][T11258] __memcg_init_list_lru_node+0x8a/0x1e0 [ 734.732795][T11258] __list_lru_init+0x3cf/0x6e0 [ 734.737603][T11258] alloc_super+0x78d/0x890 [ 734.742258][T11258] ? test_single_super+0x10/0x10 [ 734.747329][T11258] sget_userns+0xf1/0x560 [ 734.751676][T11258] ? kill_litter_super+0x60/0x60 22:54:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 734.756813][T11258] ? test_single_super+0x10/0x10 [ 734.763721][T11258] ? kill_litter_super+0x60/0x60 [ 734.768798][T11258] sget+0x10c/0x150 [ 734.772639][T11258] mount_bdev+0xff/0x3c0 [ 734.776992][T11258] ? udf_load_vrs+0xc80/0xc80 [ 734.781783][T11258] udf_mount+0x35/0x40 [ 734.786218][T11258] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 734.791782][T11258] legacy_get_tree+0xf2/0x200 [ 734.796482][T11258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.802789][T11258] vfs_get_tree+0x123/0x450 [ 734.807329][T11258] do_mount+0x1436/0x2c40 [ 734.811695][T11258] ? copy_mount_string+0x40/0x40 [ 734.816912][T11258] ? _copy_from_user+0xdd/0x150 [ 734.821780][T11258] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 734.828052][T11258] ? copy_mount_options+0x280/0x3a0 [ 734.833298][T11258] ksys_mount+0xdb/0x150 [ 734.837853][T11258] __x64_sys_mount+0xbe/0x150 [ 734.842550][T11258] do_syscall_64+0x103/0x610 [ 734.847159][T11258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.853238][T11258] RIP: 0033:0x458209 22:54:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 734.857332][T11258] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 734.877157][T11258] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 734.885860][T11258] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 734.893845][T11258] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 734.901917][T11258] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:54:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x57}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x200000000000}, 0x48) [ 734.909899][T11258] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 734.918062][T11258] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:27 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xf401, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x5, 0x300) 22:54:27 executing program 0 (fault-call:1 fault-nth:43): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x5d, 0x40011) 22:54:27 executing program 1: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) 22:54:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) [ 735.112271][T11658] FAULT_INJECTION: forcing a failure. [ 735.112271][T11658] name failslab, interval 1, probability 0, space 0, times 0 [ 735.224634][T11658] CPU: 1 PID: 11658 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 735.232750][T11658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.242830][T11658] Call Trace: [ 735.246163][T11658] dump_stack+0x172/0x1f0 [ 735.251049][T11658] should_fail.cold+0xa/0x15 [ 735.255691][T11658] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 735.261527][T11658] ? ___might_sleep+0x163/0x280 [ 735.266530][T11658] __should_failslab+0x121/0x190 [ 735.271493][T11658] should_failslab+0x9/0x14 [ 735.276013][T11658] kmem_cache_alloc_trace+0x2d1/0x760 [ 735.281528][T11658] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 735.287361][T11658] __memcg_init_list_lru_node+0x8a/0x1e0 [ 735.293031][T11658] __list_lru_init+0x3cf/0x6e0 [ 735.297909][T11658] alloc_super+0x78d/0x890 [ 735.302349][T11658] ? test_single_super+0x10/0x10 [ 735.307332][T11658] sget_userns+0xf1/0x560 [ 735.311681][T11658] ? kill_litter_super+0x60/0x60 [ 735.316643][T11658] ? test_single_super+0x10/0x10 [ 735.321594][T11658] ? kill_litter_super+0x60/0x60 [ 735.326541][T11658] sget+0x10c/0x150 [ 735.330367][T11658] mount_bdev+0xff/0x3c0 [ 735.334625][T11658] ? udf_load_vrs+0xc80/0xc80 [ 735.339326][T11658] udf_mount+0x35/0x40 [ 735.343417][T11658] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 735.348885][T11658] legacy_get_tree+0xf2/0x200 [ 735.353578][T11658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.359925][T11658] vfs_get_tree+0x123/0x450 [ 735.364456][T11658] do_mount+0x1436/0x2c40 [ 735.368804][T11658] ? copy_mount_string+0x40/0x40 [ 735.373758][T11658] ? _copy_from_user+0xdd/0x150 [ 735.378631][T11658] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 735.384889][T11658] ? copy_mount_options+0x280/0x3a0 [ 735.390107][T11658] ksys_mount+0xdb/0x150 [ 735.394365][T11658] __x64_sys_mount+0xbe/0x150 [ 735.399063][T11658] do_syscall_64+0x103/0x610 [ 735.403672][T11658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.409577][T11658] RIP: 0033:0x458209 [ 735.413479][T11658] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 735.433188][T11658] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 735.441622][T11658] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 735.449613][T11658] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 735.457612][T11658] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 735.465611][T11658] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:28 executing program 3: syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) ioctl$EVIOCGKEYCODE(r1, 0x80084504, 0x0) 22:54:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x5d, 0x40011) 22:54:28 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfc00, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 735.473616][T11658] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:28 executing program 1: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000000)) 22:54:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x5d, 0x40011) 22:54:28 executing program 0 (fault-call:1 fault-nth:44): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:28 executing program 3: syz_execute_func(&(0x7f0000000080)="44f7c33bf6000064ff0941c3c4e2c9975842c4c27d794e0066420fe2e34c99c442019dccd319") clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000001380)='threaded\x00', 0x2ddc0bb) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) 22:54:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) r2 = dup2(r0, r1) clone(0x4a0094f08c20076b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) socket$inet6(0xa, 0x2, 0x8) write$P9_RSYMLINK(r2, 0x0, 0x0) [ 735.713043][T12261] FAULT_INJECTION: forcing a failure. [ 735.713043][T12261] name failslab, interval 1, probability 0, space 0, times 0 22:54:28 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfcff, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:28 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 735.785874][T12261] CPU: 0 PID: 12261 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 735.793844][T12261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.803920][T12261] Call Trace: [ 735.807239][T12261] dump_stack+0x172/0x1f0 [ 735.811681][T12261] should_fail.cold+0xa/0x15 [ 735.816308][T12261] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 735.822348][T12261] ? ___might_sleep+0x163/0x280 [ 735.827225][T12261] __should_failslab+0x121/0x190 [ 735.832182][T12261] should_failslab+0x9/0x14 [ 735.836820][T12261] kmem_cache_alloc_trace+0x2d1/0x760 [ 735.842210][T12261] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 735.848073][T12261] __memcg_init_list_lru_node+0x8a/0x1e0 [ 735.853746][T12261] __list_lru_init+0x3cf/0x6e0 [ 735.858543][T12261] alloc_super+0x78d/0x890 [ 735.862984][T12261] ? test_single_super+0x10/0x10 [ 735.867949][T12261] sget_userns+0xf1/0x560 [ 735.872316][T12261] ? kill_litter_super+0x60/0x60 [ 735.877367][T12261] ? test_single_super+0x10/0x10 [ 735.882327][T12261] ? kill_litter_super+0x60/0x60 [ 735.887276][T12261] sget+0x10c/0x150 [ 735.891821][T12261] mount_bdev+0xff/0x3c0 [ 735.896080][T12261] ? udf_load_vrs+0xc80/0xc80 [ 735.900774][T12261] udf_mount+0x35/0x40 [ 735.904859][T12261] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 735.910425][T12261] legacy_get_tree+0xf2/0x200 [ 735.915130][T12261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.921425][T12261] vfs_get_tree+0x123/0x450 [ 735.925945][T12261] do_mount+0x1436/0x2c40 [ 735.930303][T12261] ? copy_mount_string+0x40/0x40 [ 735.935275][T12261] ? _copy_from_user+0xdd/0x150 [ 735.940156][T12261] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 735.946403][T12261] ? copy_mount_options+0x280/0x3a0 [ 735.951617][T12261] ksys_mount+0xdb/0x150 [ 735.955868][T12261] __x64_sys_mount+0xbe/0x150 [ 735.960577][T12261] do_syscall_64+0x103/0x610 [ 735.965179][T12261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.971077][T12261] RIP: 0033:0x458209 [ 735.974979][T12261] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 735.994728][T12261] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 736.003159][T12261] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 736.011150][T12261] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 736.019489][T12261] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 736.027580][T12261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:28 executing program 4: mknod(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) clone(0x3102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000200)='qnx4\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:54:28 executing program 3: [ 736.035562][T12261] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:28 executing program 3: syz_emit_ethernet(0x82, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @broadcast, [], {@generic={0x86dd}}}, 0x0) 22:54:28 executing program 1: socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)) 22:54:29 executing program 0 (fault-call:1 fault-nth:45): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:29 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfe80, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r1, 0x10099b7) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@ipv4, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={@mcast2, @dev={0xfe, 0x80, [], 0x12}, @loopback, 0x7c, 0x1, 0x5, 0x100, 0x8001, 0x400000, r2}) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000340)=0x5, 0x4) sendfile(r0, r1, 0x0, 0x88000fbfffffc) ftruncate(r1, 0x1) 22:54:29 executing program 1: socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)) 22:54:29 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 736.267377][T12798] FAULT_INJECTION: forcing a failure. [ 736.267377][T12798] name failslab, interval 1, probability 0, space 0, times 0 [ 736.339441][T12798] CPU: 1 PID: 12798 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 736.347400][T12798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.357472][T12798] Call Trace: [ 736.360801][T12798] dump_stack+0x172/0x1f0 [ 736.365178][T12798] should_fail.cold+0xa/0x15 [ 736.369795][T12798] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 736.375647][T12798] ? ___might_sleep+0x163/0x280 [ 736.380615][T12798] __should_failslab+0x121/0x190 [ 736.385586][T12798] should_failslab+0x9/0x14 [ 736.390141][T12798] kmem_cache_alloc_trace+0x2d1/0x760 [ 736.395545][T12798] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 736.401389][T12798] __memcg_init_list_lru_node+0x8a/0x1e0 [ 736.407260][T12798] __list_lru_init+0x3cf/0x6e0 [ 736.412066][T12798] alloc_super+0x78d/0x890 [ 736.416527][T12798] ? test_single_super+0x10/0x10 [ 736.421487][T12798] sget_userns+0xf1/0x560 [ 736.425843][T12798] ? kill_litter_super+0x60/0x60 [ 736.430803][T12798] ? test_single_super+0x10/0x10 22:54:29 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfec0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:29 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) 22:54:29 executing program 3: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="7365637572698c790000000000000400000000000000010000000000000000000e000000270000004803000028010000000000f7280100003401"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ptrace$cont(0x7, r1, 0x0, 0x0) [ 736.435767][T12798] ? kill_litter_super+0x60/0x60 [ 736.440729][T12798] sget+0x10c/0x150 [ 736.444565][T12798] mount_bdev+0xff/0x3c0 [ 736.448835][T12798] ? udf_load_vrs+0xc80/0xc80 [ 736.453548][T12798] udf_mount+0x35/0x40 [ 736.457667][T12798] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 736.463243][T12798] legacy_get_tree+0xf2/0x200 [ 736.467972][T12798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.474241][T12798] vfs_get_tree+0x123/0x450 [ 736.479383][T12798] do_mount+0x1436/0x2c40 [ 736.483745][T12798] ? copy_mount_string+0x40/0x40 [ 736.488790][T12798] ? _copy_from_user+0xdd/0x150 [ 736.493658][T12798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 736.499918][T12798] ? copy_mount_options+0x280/0x3a0 [ 736.505143][T12798] ksys_mount+0xdb/0x150 [ 736.509387][T12798] __x64_sys_mount+0xbe/0x150 [ 736.514101][T12798] do_syscall_64+0x103/0x610 [ 736.519130][T12798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.525131][T12798] RIP: 0033:0x458209 [ 736.529047][T12798] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 736.548684][T12798] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 736.557133][T12798] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 736.565124][T12798] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 736.573113][T12798] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 736.581113][T12798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 736.589175][T12798] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$TIOCGSID(r4, 0x5429, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r5, &(0x7f0000000080)=0x2, 0x80000003) 22:54:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) 22:54:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) io_setup(0x9, &(0x7f00000000c0)=0x0) close(r0) socket$inet(0x2, 0x3, 0x4) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 22:54:29 executing program 1: socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)) 22:54:29 executing program 0 (fault-call:1 fault-nth:46): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:29 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xff00, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:29 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) [ 737.000018][T13339] FAULT_INJECTION: forcing a failure. [ 737.000018][T13339] name failslab, interval 1, probability 0, space 0, times 0 [ 737.040226][T13339] CPU: 1 PID: 13339 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 737.048182][T13339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.058253][T13339] Call Trace: [ 737.061586][T13339] dump_stack+0x172/0x1f0 [ 737.065943][T13339] should_fail.cold+0xa/0x15 [ 737.070570][T13339] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 737.076417][T13339] ? ___might_sleep+0x163/0x280 [ 737.081309][T13339] __should_failslab+0x121/0x190 [ 737.086269][T13339] should_failslab+0x9/0x14 [ 737.090792][T13339] kmem_cache_alloc_trace+0x2d1/0x760 [ 737.096188][T13339] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 737.102025][T13339] __memcg_init_list_lru_node+0x8a/0x1e0 [ 737.107683][T13339] __list_lru_init+0x3cf/0x6e0 [ 737.112482][T13339] alloc_super+0x78d/0x890 [ 737.116921][T13339] ? test_single_super+0x10/0x10 [ 737.121882][T13339] sget_userns+0xf1/0x560 [ 737.126223][T13339] ? kill_litter_super+0x60/0x60 [ 737.131174][T13339] ? test_single_super+0x10/0x10 [ 737.136124][T13339] ? kill_litter_super+0x60/0x60 22:54:30 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfffc, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) 22:54:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 737.141079][T13339] sget+0x10c/0x150 [ 737.144910][T13339] mount_bdev+0xff/0x3c0 [ 737.149173][T13339] ? udf_load_vrs+0xc80/0xc80 [ 737.153973][T13339] udf_mount+0x35/0x40 [ 737.158121][T13339] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 737.163613][T13339] legacy_get_tree+0xf2/0x200 [ 737.168334][T13339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.174609][T13339] vfs_get_tree+0x123/0x450 [ 737.179140][T13339] do_mount+0x1436/0x2c40 [ 737.183577][T13339] ? copy_mount_string+0x40/0x40 [ 737.188541][T13339] ? _copy_from_user+0xdd/0x150 [ 737.193594][T13339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 737.199865][T13339] ? copy_mount_options+0x280/0x3a0 [ 737.205363][T13339] ksys_mount+0xdb/0x150 [ 737.209630][T13339] __x64_sys_mount+0xbe/0x150 [ 737.214337][T13339] do_syscall_64+0x103/0x610 [ 737.218957][T13339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.224990][T13339] RIP: 0033:0x458209 22:54:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)) 22:54:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 737.228916][T13339] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.248534][T13339] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 737.256961][T13339] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 737.264961][T13339] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 737.272948][T13339] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 737.281030][T13339] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 737.289019][T13339] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0xc0189436, 0x0) 22:54:30 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x1fffff, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000140)=0xc) fchdir(r4) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mq_timedsend(r2, &(0x7f0000002500)="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", 0x1008, 0x5, 0x0) 22:54:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$TIOCGSID(r4, 0x5429, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r5, &(0x7f0000000080)=0x2, 0x80000003) 22:54:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(0xffffffffffffffff, r0, &(0x7f0000000240)=0x5d, 0x40011) 22:54:30 executing program 0 (fault-call:1 fault-nth:47): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0xc0189436, 0x0) [ 737.504977][T13768] FAULT_INJECTION: forcing a failure. [ 737.504977][T13768] name failslab, interval 1, probability 0, space 0, times 0 [ 737.568486][T13768] CPU: 1 PID: 13768 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 737.576436][T13768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.586506][T13768] Call Trace: [ 737.589833][T13768] dump_stack+0x172/0x1f0 [ 737.594216][T13768] should_fail.cold+0xa/0x15 [ 737.598926][T13768] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 737.604776][T13768] ? ___might_sleep+0x163/0x280 [ 737.609664][T13768] __should_failslab+0x121/0x190 [ 737.615237][T13768] should_failslab+0x9/0x14 [ 737.619759][T13768] kmem_cache_alloc_trace+0x2d1/0x760 [ 737.625156][T13768] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 737.630991][T13768] __memcg_init_list_lru_node+0x8a/0x1e0 [ 737.636765][T13768] __list_lru_init+0x3cf/0x6e0 [ 737.641595][T13768] alloc_super+0x78d/0x890 [ 737.646038][T13768] ? test_single_super+0x10/0x10 [ 737.651034][T13768] sget_userns+0xf1/0x560 [ 737.655501][T13768] ? kill_litter_super+0x60/0x60 [ 737.660461][T13768] ? test_single_super+0x10/0x10 [ 737.665418][T13768] ? kill_litter_super+0x60/0x60 [ 737.670459][T13768] sget+0x10c/0x150 [ 737.674310][T13768] mount_bdev+0xff/0x3c0 [ 737.678570][T13768] ? udf_load_vrs+0xc80/0xc80 [ 737.686611][T13768] udf_mount+0x35/0x40 [ 737.690697][T13768] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 737.696180][T13768] legacy_get_tree+0xf2/0x200 [ 737.700877][T13768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.707136][T13768] vfs_get_tree+0x123/0x450 [ 737.711668][T13768] do_mount+0x1436/0x2c40 [ 737.716027][T13768] ? copy_mount_string+0x40/0x40 [ 737.720982][T13768] ? _copy_from_user+0xdd/0x150 [ 737.725869][T13768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 737.732116][T13768] ? copy_mount_options+0x280/0x3a0 [ 737.737328][T13768] ksys_mount+0xdb/0x150 [ 737.741581][T13768] __x64_sys_mount+0xbe/0x150 [ 737.746266][T13768] do_syscall_64+0x103/0x610 [ 737.750873][T13768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.756763][T13768] RIP: 0033:0x458209 [ 737.760658][T13768] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.780276][T13768] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 737.788711][T13768] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 737.796691][T13768] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 737.804671][T13768] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:54:30 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x1000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(0xffffffffffffffff, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 737.812649][T13768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 737.820632][T13768] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0xc0189436, 0x0) 22:54:30 executing program 0 (fault-call:1 fault-nth:48): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:30 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x2000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$TIOCGSID(r4, 0x5429, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r5, &(0x7f0000000080)=0x2, 0x80000003) [ 737.953532][ T26] audit: type=1326 audit(1553554470.807:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13783 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(0xffffffffffffffff, r0, &(0x7f0000000240)=0x5d, 0x40011) [ 738.069165][T14261] FAULT_INJECTION: forcing a failure. [ 738.069165][T14261] name failslab, interval 1, probability 0, space 0, times 0 [ 738.113270][T14261] CPU: 1 PID: 14261 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 738.121229][T14261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.131329][T14261] Call Trace: [ 738.134647][T14261] dump_stack+0x172/0x1f0 [ 738.138986][T14261] should_fail.cold+0xa/0x15 [ 738.143589][T14261] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 738.149417][T14261] ? ___might_sleep+0x163/0x280 [ 738.154301][T14261] __should_failslab+0x121/0x190 [ 738.159258][T14261] should_failslab+0x9/0x14 [ 738.163797][T14261] kmem_cache_alloc_trace+0x2d1/0x760 [ 738.169194][T14261] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 738.175030][T14261] __memcg_init_list_lru_node+0x8a/0x1e0 [ 738.180745][T14261] __list_lru_init+0x3cf/0x6e0 [ 738.185530][T14261] alloc_super+0x78d/0x890 [ 738.189956][T14261] ? test_single_super+0x10/0x10 [ 738.194888][T14261] sget_userns+0xf1/0x560 [ 738.199211][T14261] ? kill_litter_super+0x60/0x60 [ 738.204149][T14261] ? test_single_super+0x10/0x10 [ 738.209073][T14261] ? kill_litter_super+0x60/0x60 [ 738.213997][T14261] sget+0x10c/0x150 [ 738.217856][T14261] mount_bdev+0xff/0x3c0 [ 738.222091][T14261] ? udf_load_vrs+0xc80/0xc80 [ 738.226757][T14261] udf_mount+0x35/0x40 [ 738.230820][T14261] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 738.236283][T14261] legacy_get_tree+0xf2/0x200 [ 738.241000][T14261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.247262][T14261] vfs_get_tree+0x123/0x450 [ 738.251784][T14261] do_mount+0x1436/0x2c40 [ 738.256109][T14261] ? copy_mount_string+0x40/0x40 [ 738.261049][T14261] ? _copy_from_user+0xdd/0x150 [ 738.265905][T14261] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.272147][T14261] ? copy_mount_options+0x280/0x3a0 [ 738.277470][T14261] ksys_mount+0xdb/0x150 [ 738.281711][T14261] __x64_sys_mount+0xbe/0x150 [ 738.286433][T14261] do_syscall_64+0x103/0x610 [ 738.291040][T14261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.296948][T14261] RIP: 0033:0x458209 [ 738.300834][T14261] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.320426][T14261] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 738.329097][T14261] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 738.337111][T14261] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 738.345113][T14261] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 738.353111][T14261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 738.361111][T14261] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 738.371174][ C0] net_ratelimit: 20 callbacks suppressed [ 738.371184][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.382834][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000140)=0xc) fchdir(r4) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mq_timedsend(r2, &(0x7f0000002500)="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", 0x1008, 0x5, 0x0) 22:54:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x61) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = epoll_create1(0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000002c0)={0x10000000}) r3 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) 22:54:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x5d, 0x40011) 22:54:31 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x3000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$TIOCGSID(r4, 0x5429, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r5, &(0x7f0000000080)=0x2, 0x80000003) 22:54:31 executing program 0 (fault-call:1 fault-nth:49): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x5d, 0x40011) [ 738.552275][T14576] FAULT_INJECTION: forcing a failure. [ 738.552275][T14576] name failslab, interval 1, probability 0, space 0, times 0 [ 738.595285][ T26] audit: type=1326 audit(1553554471.447:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14579 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 738.598447][T14576] CPU: 1 PID: 14576 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 738.624885][T14576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.636701][T14576] Call Trace: [ 738.640029][T14576] dump_stack+0x172/0x1f0 [ 738.644388][T14576] should_fail.cold+0xa/0x15 [ 738.649007][T14576] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 738.654850][T14576] ? ___might_sleep+0x163/0x280 [ 738.659833][T14576] __should_failslab+0x121/0x190 [ 738.664797][T14576] should_failslab+0x9/0x14 [ 738.669335][T14576] kmem_cache_alloc_trace+0x2d1/0x760 [ 738.674730][T14576] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 738.680574][T14576] __memcg_init_list_lru_node+0x8a/0x1e0 [ 738.686231][T14576] __list_lru_init+0x3cf/0x6e0 [ 738.691010][T14576] alloc_super+0x78d/0x890 [ 738.695441][T14576] ? test_single_super+0x10/0x10 [ 738.700515][T14576] sget_userns+0xf1/0x560 [ 738.704861][T14576] ? kill_litter_super+0x60/0x60 [ 738.711985][T14576] ? test_single_super+0x10/0x10 [ 738.716940][T14576] ? kill_litter_super+0x60/0x60 [ 738.722242][T14576] sget+0x10c/0x150 [ 738.726067][T14576] mount_bdev+0xff/0x3c0 [ 738.730338][T14576] ? udf_load_vrs+0xc80/0xc80 [ 738.735046][T14576] udf_mount+0x35/0x40 [ 738.739142][T14576] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 738.744622][T14576] legacy_get_tree+0xf2/0x200 [ 738.749328][T14576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.755596][T14576] vfs_get_tree+0x123/0x450 [ 738.760579][T14576] do_mount+0x1436/0x2c40 [ 738.764934][T14576] ? copy_mount_string+0x40/0x40 [ 738.769883][T14576] ? _copy_from_user+0xdd/0x150 [ 738.774757][T14576] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.781356][T14576] ? copy_mount_options+0x280/0x3a0 [ 738.786656][T14576] ksys_mount+0xdb/0x150 [ 738.790941][T14576] __x64_sys_mount+0xbe/0x150 [ 738.795636][T14576] do_syscall_64+0x103/0x610 [ 738.800245][T14576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.806167][T14576] RIP: 0033:0x458209 [ 738.810070][T14576] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.829789][T14576] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 738.838323][T14576] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 22:54:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000140)=0xc) fchdir(r4) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mq_timedsend(r2, &(0x7f0000002500)="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", 0x1008, 0x5, 0x0) 22:54:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$TIOCGSID(r4, 0x5429, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') [ 738.846315][T14576] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 738.854313][T14576] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 738.862330][T14576] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 738.870321][T14576] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 738.878701][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 738.884558][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 738.890923][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 738.896806][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 738.907094][ T26] audit: type=1326 audit(1553554471.767:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14802 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x5d, 0x40011) 22:54:31 executing program 0 (fault-call:1 fault-nth:50): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:31 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x4000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 739.060354][T14909] FAULT_INJECTION: forcing a failure. [ 739.060354][T14909] name failslab, interval 1, probability 0, space 0, times 0 [ 739.080642][T14909] CPU: 1 PID: 14909 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 739.088589][T14909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.098744][T14909] Call Trace: [ 739.102065][T14909] dump_stack+0x172/0x1f0 [ 739.106605][T14909] should_fail.cold+0xa/0x15 [ 739.111225][T14909] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 739.117062][T14909] ? ___might_sleep+0x163/0x280 [ 739.121967][T14909] __should_failslab+0x121/0x190 [ 739.126932][T14909] should_failslab+0x9/0x14 [ 739.131451][T14909] kmem_cache_alloc_trace+0x2d1/0x760 [ 739.136844][T14909] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 739.142679][T14909] __memcg_init_list_lru_node+0x8a/0x1e0 [ 739.148345][T14909] __list_lru_init+0x3cf/0x6e0 [ 739.153251][T14909] alloc_super+0x78d/0x890 [ 739.157865][T14909] ? test_single_super+0x10/0x10 [ 739.162830][T14909] sget_userns+0xf1/0x560 [ 739.167179][T14909] ? kill_litter_super+0x60/0x60 [ 739.172135][T14909] ? test_single_super+0x10/0x10 [ 739.177086][T14909] ? kill_litter_super+0x60/0x60 [ 739.182085][T14909] sget+0x10c/0x150 [ 739.185898][T14909] mount_bdev+0xff/0x3c0 [ 739.190164][T14909] ? udf_load_vrs+0xc80/0xc80 [ 739.195255][T14909] udf_mount+0x35/0x40 [ 739.199323][T14909] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 739.204785][T14909] legacy_get_tree+0xf2/0x200 [ 739.209480][T14909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.215711][T14909] vfs_get_tree+0x123/0x450 [ 739.220207][T14909] do_mount+0x1436/0x2c40 [ 739.224532][T14909] ? copy_mount_string+0x40/0x40 [ 739.229479][T14909] ? _copy_from_user+0xdd/0x150 [ 739.234340][T14909] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 739.240575][T14909] ? copy_mount_options+0x280/0x3a0 [ 739.245861][T14909] ksys_mount+0xdb/0x150 [ 739.250205][T14909] __x64_sys_mount+0xbe/0x150 [ 739.254878][T14909] do_syscall_64+0x103/0x610 [ 739.259465][T14909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.265360][T14909] RIP: 0033:0x458209 [ 739.269241][T14909] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.289073][T14909] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 739.297480][T14909] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 739.305530][T14909] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 739.313502][T14909] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 739.321483][T14909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 739.329454][T14909] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 739.341371][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 739.347160][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 739.353201][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 739.358965][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:32 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) unlink(0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 22:54:32 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x5000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, 0x0, 0x40011) 22:54:32 executing program 0 (fault-call:1 fault-nth:51): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$TIOCGSID(r4, 0x5429, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 739.444344][T15021] FAULT_INJECTION: forcing a failure. [ 739.444344][T15021] name failslab, interval 1, probability 0, space 0, times 0 [ 739.491243][T15021] CPU: 0 PID: 15021 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 739.499208][T15021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.509628][T15021] Call Trace: [ 739.512948][T15021] dump_stack+0x172/0x1f0 [ 739.517387][T15021] should_fail.cold+0xa/0x15 [ 739.521997][T15021] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 739.527827][T15021] ? ___might_sleep+0x163/0x280 [ 739.532700][T15021] __should_failslab+0x121/0x190 [ 739.537663][T15021] should_failslab+0x9/0x14 [ 739.542183][T15021] kmem_cache_alloc_trace+0x2d1/0x760 [ 739.547577][T15021] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 739.553399][T15021] __memcg_init_list_lru_node+0x8a/0x1e0 [ 739.559050][T15021] __list_lru_init+0x3cf/0x6e0 [ 739.563834][T15021] alloc_super+0x78d/0x890 [ 739.568259][T15021] ? test_single_super+0x10/0x10 [ 739.573211][T15021] sget_userns+0xf1/0x560 [ 739.577543][T15021] ? kill_litter_super+0x60/0x60 [ 739.582488][T15021] ? test_single_super+0x10/0x10 [ 739.587456][T15021] ? kill_litter_super+0x60/0x60 [ 739.592395][T15021] sget+0x10c/0x150 [ 739.596306][T15021] mount_bdev+0xff/0x3c0 [ 739.600556][T15021] ? udf_load_vrs+0xc80/0xc80 [ 739.605242][T15021] udf_mount+0x35/0x40 [ 739.609326][T15021] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 739.614876][T15021] legacy_get_tree+0xf2/0x200 [ 739.619558][T15021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.625916][T15021] vfs_get_tree+0x123/0x450 [ 739.630419][T15021] do_mount+0x1436/0x2c40 [ 739.634763][T15021] ? copy_mount_string+0x40/0x40 [ 739.639724][T15021] ? _copy_from_user+0xdd/0x150 [ 739.644591][T15021] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 739.650849][T15021] ? copy_mount_options+0x280/0x3a0 [ 739.656162][T15021] ksys_mount+0xdb/0x150 [ 739.660412][T15021] __x64_sys_mount+0xbe/0x150 [ 739.665108][T15021] do_syscall_64+0x103/0x610 [ 739.669708][T15021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.675606][T15021] RIP: 0033:0x458209 [ 739.679512][T15021] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.699213][T15021] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 739.707660][T15021] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 739.715649][T15021] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 739.723636][T15021] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 739.731617][T15021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 22:54:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, 0x0, 0x40011) [ 739.739592][T15021] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, 0x0, 0x40011) 22:54:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000140)=0xc) fchdir(r4) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mq_timedsend(r2, &(0x7f0000002500)="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", 0x1008, 0x5, 0x0) 22:54:32 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x6000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:32 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000280)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$P9_RSTATu(r1, &(0x7f0000000040)=ANY=[], 0x445144e9) sendmsg$alg(0xffffffffffffffff, 0x0, 0x40000) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) write$P9_RLERROR(r1, 0x0, 0x0) 22:54:32 executing program 0 (fault-call:1 fault-nth:52): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$TIOCGSID(r4, 0x5429, 0x0) 22:54:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240), 0x40011) [ 740.009643][T15382] FAULT_INJECTION: forcing a failure. [ 740.009643][T15382] name failslab, interval 1, probability 0, space 0, times 0 [ 740.056094][ T26] audit: type=1326 audit(1553554472.907:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15364 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 740.062538][T15382] CPU: 0 PID: 15382 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 740.085977][T15382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.096114][T15382] Call Trace: [ 740.099427][T15382] dump_stack+0x172/0x1f0 [ 740.103810][T15382] should_fail.cold+0xa/0x15 [ 740.108615][T15382] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 740.114550][T15382] ? ___might_sleep+0x163/0x280 [ 740.119421][T15382] __should_failslab+0x121/0x190 [ 740.124376][T15382] should_failslab+0x9/0x14 [ 740.128887][T15382] kmem_cache_alloc_trace+0x2d1/0x760 [ 740.134273][T15382] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 740.140141][T15382] __memcg_init_list_lru_node+0x8a/0x1e0 [ 740.145803][T15382] __list_lru_init+0x3cf/0x6e0 [ 740.150586][T15382] alloc_super+0x78d/0x890 [ 740.155025][T15382] ? test_single_super+0x10/0x10 [ 740.160071][T15382] sget_userns+0xf1/0x560 [ 740.164410][T15382] ? kill_litter_super+0x60/0x60 [ 740.169366][T15382] ? test_single_super+0x10/0x10 [ 740.174330][T15382] ? kill_litter_super+0x60/0x60 [ 740.179300][T15382] sget+0x10c/0x150 [ 740.183133][T15382] mount_bdev+0xff/0x3c0 [ 740.187382][T15382] ? udf_load_vrs+0xc80/0xc80 [ 740.192079][T15382] udf_mount+0x35/0x40 [ 740.196184][T15382] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 740.201659][T15382] legacy_get_tree+0xf2/0x200 [ 740.206357][T15382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.212614][T15382] vfs_get_tree+0x123/0x450 [ 740.217138][T15382] do_mount+0x1436/0x2c40 [ 740.221487][T15382] ? copy_mount_string+0x40/0x40 [ 740.226442][T15382] ? _copy_from_user+0xdd/0x150 [ 740.231329][T15382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 740.237588][T15382] ? copy_mount_options+0x280/0x3a0 [ 740.242914][T15382] ksys_mount+0xdb/0x150 [ 740.247255][T15382] __x64_sys_mount+0xbe/0x150 [ 740.252129][T15382] do_syscall_64+0x103/0x610 22:54:32 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x7000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240), 0x40011) 22:54:33 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xa000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240), 0x40011) [ 740.256740][T15382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.262678][T15382] RIP: 0033:0x458209 [ 740.266585][T15382] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.286221][T15382] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 740.294656][T15382] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 22:54:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x8f, 0x0, [0x2]}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 740.302651][T15382] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 740.310638][T15382] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 740.318634][T15382] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 740.326702][T15382] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x0) 22:54:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000140)=0xc) fchdir(r4) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mq_timedsend(r2, &(0x7f0000002500)="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", 0x1008, 0x5, 0x0) 22:54:33 executing program 0 (fault-call:1 fault-nth:53): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x61) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 22:54:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) dup2(r2, r2) 22:54:33 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xe000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x0) [ 740.882646][T15980] FAULT_INJECTION: forcing a failure. [ 740.882646][T15980] name failslab, interval 1, probability 0, space 0, times 0 [ 740.922239][T15980] CPU: 0 PID: 15980 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 740.930186][T15980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.940251][T15980] Call Trace: [ 740.943590][T15980] dump_stack+0x172/0x1f0 [ 740.947929][T15980] should_fail.cold+0xa/0x15 [ 740.952524][T15980] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 740.958354][T15980] ? ___might_sleep+0x163/0x280 [ 740.963216][T15980] __should_failslab+0x121/0x190 [ 740.968165][T15980] should_failslab+0x9/0x14 [ 740.972671][T15980] kmem_cache_alloc_trace+0x2d1/0x760 [ 740.978066][T15980] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 740.983890][T15980] __memcg_init_list_lru_node+0x8a/0x1e0 [ 740.989527][T15980] __list_lru_init+0x3cf/0x6e0 [ 740.994390][T15980] alloc_super+0x78d/0x890 [ 740.998824][T15980] ? test_single_super+0x10/0x10 [ 741.003772][T15980] sget_userns+0xf1/0x560 [ 741.008103][T15980] ? kill_litter_super+0x60/0x60 [ 741.013042][T15980] ? test_single_super+0x10/0x10 [ 741.017978][T15980] ? kill_litter_super+0x60/0x60 [ 741.022911][T15980] sget+0x10c/0x150 [ 741.026724][T15980] mount_bdev+0xff/0x3c0 [ 741.030967][T15980] ? udf_load_vrs+0xc80/0xc80 [ 741.035654][T15980] udf_mount+0x35/0x40 [ 741.039748][T15980] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 741.045407][T15980] legacy_get_tree+0xf2/0x200 [ 741.050108][T15980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.056372][T15980] vfs_get_tree+0x123/0x450 [ 741.060887][T15980] do_mount+0x1436/0x2c40 [ 741.065227][T15980] ? copy_mount_string+0x40/0x40 [ 741.070181][T15980] ? _copy_from_user+0xdd/0x150 [ 741.075040][T15980] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 741.081306][T15980] ? copy_mount_options+0x280/0x3a0 [ 741.086701][T15980] ksys_mount+0xdb/0x150 [ 741.090946][T15980] __x64_sys_mount+0xbe/0x150 [ 741.095730][T15980] do_syscall_64+0x103/0x610 [ 741.100341][T15980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.106246][T15980] RIP: 0033:0x458209 [ 741.110142][T15980] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:54:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00p\x06e\xdd\xb9\xe9\xb5oH\xd9\xcf\x92\x97n\x13\xd6)\x02\x1d\xf8\xdc^\x81\x83\x99\xaa\xbf\xa9I\xc1\x8b\x06q_\x1a\xaa=\xc3\xec\xbb\xebr[\x86\xfb\a\xf7\x8e\xd3\xe8}\xe70i\x84_g\xb9\x8c\n\xd9\x895\xba\xf4\xf5I4q\xdd\xdf1 \xb2\\\x9c@\"^5\xae\x02t\x02\x7fz\xae\xa4:k\x04/2\xcb\fWt\x8d\x87F\xc69\x88\'\xcf/\x97U\xe9%\v\xa7<\t%-K\x81%\xa4\xa4\xb8\xd1Z\xc3i\n\xdeR\xa7e?p\xb4\xb9\xbbt\x19!\xc0\xd2\xe3\xdb\x9b@O>\xa7\x82\xb6\x02(\x8b1W;/\x82\xbf6\xe2\xd4\xfaM,\xe1kx\xa2\xf1:}IO\x80\v\xfb\xa1\x97\xa6\xaa\xdaU\x05\xe3g\xe5\xe9\xfc\xdcr\xad\x04\xc4\xc7\xa3\x904A&\xdf\xaf\x10\xf2\x0e\xc6\xaf\f\x9c\xcf\x8e\xcdQ5\xffs\xc4\x01\xe35\x11\xc1\x17C+\xab\xcf\xe2c\xb7`\xcb&\x84Z\x8b\xce\x9e\x9b\xb3a\x10\xf7~*\x84\x85L\x7f\xee\x18Vx\xcd>\xdcE\xf7\xbc\x13\xe0\x97\xd1_\x16\x0fU@\xe5\x8bn\x94\xea\xbd9G\xc8\xda\x9b\xab\x16\xb6\x16\x03\xba#6\x8c\xbbR\x81+\xbbu \xdcv\xc8\xd7\xec3\xd3\x01\xfd\xb546\xf5\xb4\xcf\x856\xea\xbf4)\xda\x16d\x86') sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x0) [ 741.129855][T15980] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 741.138280][T15980] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 741.146271][T15980] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 741.154257][T15980] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 741.162233][T15980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 741.170206][T15980] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:34 executing program 0 (fault-call:1 fault-nth:54): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 741.228052][ T26] audit: type=1326 audit(1553554474.077:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15984 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:34 executing program 3: 22:54:34 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xf000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:34 executing program 5: 22:54:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r2, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) [ 741.340956][T16306] FAULT_INJECTION: forcing a failure. [ 741.340956][T16306] name failslab, interval 1, probability 0, space 0, times 0 [ 741.376976][T16306] CPU: 0 PID: 16306 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 741.384930][T16306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.395008][T16306] Call Trace: [ 741.398341][T16306] dump_stack+0x172/0x1f0 [ 741.402703][T16306] should_fail.cold+0xa/0x15 [ 741.407338][T16306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 741.413171][T16306] ? ___might_sleep+0x163/0x280 [ 741.418039][T16306] __should_failslab+0x121/0x190 [ 741.423087][T16306] should_failslab+0x9/0x14 [ 741.427614][T16306] kmem_cache_alloc_trace+0x2d1/0x760 [ 741.433185][T16306] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 741.439018][T16306] __memcg_init_list_lru_node+0x8a/0x1e0 [ 741.444668][T16306] __list_lru_init+0x3cf/0x6e0 [ 741.449436][T16306] alloc_super+0x78d/0x890 [ 741.453854][T16306] ? test_single_super+0x10/0x10 [ 741.458791][T16306] sget_userns+0xf1/0x560 [ 741.463122][T16306] ? kill_litter_super+0x60/0x60 [ 741.468077][T16306] ? test_single_super+0x10/0x10 [ 741.473025][T16306] ? kill_litter_super+0x60/0x60 [ 741.477966][T16306] sget+0x10c/0x150 [ 741.481782][T16306] mount_bdev+0xff/0x3c0 [ 741.486032][T16306] ? udf_load_vrs+0xc80/0xc80 [ 741.490718][T16306] udf_mount+0x35/0x40 [ 741.494797][T16306] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 741.500328][T16306] legacy_get_tree+0xf2/0x200 [ 741.505018][T16306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.511266][T16306] vfs_get_tree+0x123/0x450 [ 741.515799][T16306] do_mount+0x1436/0x2c40 [ 741.520225][T16306] ? copy_mount_string+0x40/0x40 [ 741.525178][T16306] ? _copy_from_user+0xdd/0x150 [ 741.530045][T16306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 741.536305][T16306] ? copy_mount_options+0x280/0x3a0 [ 741.541516][T16306] ksys_mount+0xdb/0x150 [ 741.545781][T16306] __x64_sys_mount+0xbe/0x150 [ 741.550460][T16306] do_syscall_64+0x103/0x610 [ 741.555055][T16306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.560963][T16306] RIP: 0033:0x458209 [ 741.564856][T16306] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 741.584466][T16306] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 741.592884][T16306] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 741.600883][T16306] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 741.608862][T16306] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 741.616843][T16306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 741.624996][T16306] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000140)=0xc) fchdir(r4) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) 22:54:34 executing program 3: 22:54:34 executing program 5: 22:54:34 executing program 0 (fault-call:1 fault-nth:55): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) ftruncate(r2, 0x0) 22:54:34 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x11000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 741.838376][T16525] FAULT_INJECTION: forcing a failure. [ 741.838376][T16525] name failslab, interval 1, probability 0, space 0, times 0 [ 741.873021][T16525] CPU: 1 PID: 16525 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 741.880968][T16525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.891501][T16525] Call Trace: [ 741.894823][T16525] dump_stack+0x172/0x1f0 [ 741.899188][T16525] should_fail.cold+0xa/0x15 [ 741.903811][T16525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 741.909649][T16525] ? ___might_sleep+0x163/0x280 [ 741.914615][T16525] __should_failslab+0x121/0x190 [ 741.919568][T16525] should_failslab+0x9/0x14 [ 741.924082][T16525] kmem_cache_alloc_trace+0x2d1/0x760 [ 741.929469][T16525] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 741.935300][T16525] __memcg_init_list_lru_node+0x8a/0x1e0 [ 741.940949][T16525] __list_lru_init+0x3cf/0x6e0 [ 741.945729][T16525] alloc_super+0x78d/0x890 [ 741.950157][T16525] ? test_single_super+0x10/0x10 [ 741.955106][T16525] sget_userns+0xf1/0x560 [ 741.959453][T16525] ? kill_litter_super+0x60/0x60 [ 741.964409][T16525] ? test_single_super+0x10/0x10 [ 741.969349][T16525] ? kill_litter_super+0x60/0x60 [ 741.974287][T16525] sget+0x10c/0x150 [ 741.978139][T16525] mount_bdev+0xff/0x3c0 [ 741.982383][T16525] ? udf_load_vrs+0xc80/0xc80 [ 741.987066][T16525] udf_mount+0x35/0x40 [ 741.991146][T16525] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 741.996727][T16525] legacy_get_tree+0xf2/0x200 [ 742.001692][T16525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.007959][T16525] vfs_get_tree+0x123/0x450 [ 742.012474][T16525] do_mount+0x1436/0x2c40 [ 742.016826][T16525] ? copy_mount_string+0x40/0x40 [ 742.021772][T16525] ? _copy_from_user+0xdd/0x150 [ 742.026642][T16525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 742.032888][T16525] ? copy_mount_options+0x280/0x3a0 [ 742.038124][T16525] ksys_mount+0xdb/0x150 [ 742.042379][T16525] __x64_sys_mount+0xbe/0x150 [ 742.047072][T16525] do_syscall_64+0x103/0x610 [ 742.051694][T16525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.057704][T16525] RIP: 0033:0x458209 [ 742.061607][T16525] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 742.081334][T16525] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:54:35 executing program 3: 22:54:35 executing program 5: [ 742.089776][T16525] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 742.097766][T16525] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 742.105755][T16525] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 742.113830][T16525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 742.121810][T16525] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:35 executing program 3: getpgid(0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f00000001c0)='icmp6\x00', 0x6, 0x3) mprotect(&(0x7f000010d000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x24180) read(r0, &(0x7f0000000200)=""/30, 0xfffffe80) 22:54:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r6, 0x4, 0x40400) write$FUSE_WRITE(r6, &(0x7f0000000080)={0x18}, 0x18) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 22:54:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) 22:54:35 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x18000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 742.390330][ T26] audit: type=1326 audit(1553554475.237:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16526 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r1, 0x4, 0x40400) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18}, 0x18) 22:54:35 executing program 0 (fault-call:1 fault-nth:56): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:35 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') 22:54:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000140)=0xc) fchdir(r4) 22:54:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) 22:54:35 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x20000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) [ 742.794889][T17179] FAULT_INJECTION: forcing a failure. [ 742.794889][T17179] name failslab, interval 1, probability 0, space 0, times 0 [ 742.825139][T17179] CPU: 1 PID: 17179 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 742.833097][T17179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.843343][T17179] Call Trace: [ 742.846676][T17179] dump_stack+0x172/0x1f0 [ 742.851048][T17179] should_fail.cold+0xa/0x15 [ 742.855672][T17179] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 742.861502][T17179] ? ___might_sleep+0x163/0x280 [ 742.866371][T17179] __should_failslab+0x121/0x190 [ 742.871342][T17179] should_failslab+0x9/0x14 [ 742.875866][T17179] kmem_cache_alloc_trace+0x2d1/0x760 [ 742.881272][T17179] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 742.887106][T17179] __memcg_init_list_lru_node+0x8a/0x1e0 [ 742.892755][T17179] __list_lru_init+0x3cf/0x6e0 [ 742.897540][T17179] alloc_super+0x78d/0x890 [ 742.901963][T17179] ? test_single_super+0x10/0x10 [ 742.906909][T17179] sget_userns+0xf1/0x560 [ 742.911255][T17179] ? kill_litter_super+0x60/0x60 [ 742.916307][T17179] ? test_single_super+0x10/0x10 [ 742.921245][T17179] ? kill_litter_super+0x60/0x60 [ 742.926192][T17179] sget+0x10c/0x150 [ 742.930046][T17179] mount_bdev+0xff/0x3c0 [ 742.934307][T17179] ? udf_load_vrs+0xc80/0xc80 [ 742.939001][T17179] udf_mount+0x35/0x40 22:54:35 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 22:54:35 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1000000002, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x20000, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) [ 742.943080][T17179] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 742.948548][T17179] legacy_get_tree+0xf2/0x200 [ 742.953235][T17179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.959586][T17179] vfs_get_tree+0x123/0x450 [ 742.964132][T17179] do_mount+0x1436/0x2c40 [ 742.968487][T17179] ? copy_mount_string+0x40/0x40 [ 742.973475][T17179] ? _copy_from_user+0xdd/0x150 [ 742.978350][T17179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 742.984603][T17179] ? copy_mount_options+0x280/0x3a0 [ 742.989828][T17179] ksys_mount+0xdb/0x150 22:54:35 executing program 3: [ 742.994185][T17179] __x64_sys_mount+0xbe/0x150 [ 742.998965][T17179] do_syscall_64+0x103/0x610 [ 743.003581][T17179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.009479][T17179] RIP: 0033:0x458209 [ 743.013386][T17179] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.033003][T17179] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:54:35 executing program 3: 22:54:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 743.041722][T17179] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 743.049714][T17179] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 743.057792][T17179] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 743.065794][T17179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 743.073786][T17179] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 22:54:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000140)=0xc) 22:54:36 executing program 0 (fault-call:1 fault-nth:57): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:36 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b8366716, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 22:54:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:36 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x2c010000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 743.306439][T17619] FAULT_INJECTION: forcing a failure. [ 743.306439][T17619] name failslab, interval 1, probability 0, space 0, times 0 [ 743.407572][T17619] CPU: 1 PID: 17619 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 743.415542][T17619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.425614][T17619] Call Trace: [ 743.428947][T17619] dump_stack+0x172/0x1f0 [ 743.433335][T17619] should_fail.cold+0xa/0x15 [ 743.437957][T17619] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 743.443782][T17619] ? should_fail+0x1a/0x852 [ 743.448327][T17619] __should_failslab+0x121/0x190 [ 743.453289][T17619] should_failslab+0x9/0x14 [ 743.457824][T17619] kmem_cache_alloc_trace+0x2d1/0x760 [ 743.463216][T17619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 743.469493][T17619] udf_fill_super+0x22c/0x16d1 [ 743.474279][T17619] ? pointer+0x910/0x910 [ 743.478554][T17619] ? udf_load_vrs+0xc80/0xc80 [ 743.483252][T17619] ? snprintf+0xbb/0xf0 [ 743.487436][T17619] ? vsprintf+0x40/0x40 [ 743.491611][T17619] ? set_blocksize+0x2bf/0x340 [ 743.496394][T17619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.502659][T17619] mount_bdev+0x307/0x3c0 [ 743.507011][T17619] ? udf_load_vrs+0xc80/0xc80 [ 743.511702][T17619] udf_mount+0x35/0x40 [ 743.515790][T17619] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 743.521267][T17619] legacy_get_tree+0xf2/0x200 [ 743.525968][T17619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.532233][T17619] vfs_get_tree+0x123/0x450 [ 743.536773][T17619] do_mount+0x1436/0x2c40 [ 743.541134][T17619] ? copy_mount_string+0x40/0x40 [ 743.546166][T17619] ? _copy_from_user+0xdd/0x150 [ 743.551042][T17619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:54:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 22:54:36 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x4c010000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 743.557307][T17619] ? copy_mount_options+0x280/0x3a0 [ 743.562536][T17619] ksys_mount+0xdb/0x150 [ 743.566794][T17619] __x64_sys_mount+0xbe/0x150 [ 743.571586][T17619] do_syscall_64+0x103/0x610 [ 743.576207][T17619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.582121][T17619] RIP: 0033:0x458209 [ 743.586043][T17619] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.605936][T17619] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 743.614398][T17619] RAX: ffffffffffffffda RBX: 00007fa5459bbc90 RCX: 0000000000458209 [ 743.622394][T17619] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 743.630413][T17619] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 743.638525][T17619] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 743.646543][T17619] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000003 [ 743.711123][ C0] net_ratelimit: 20 callbacks suppressed [ 743.711131][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 743.722769][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 743.728595][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 743.734506][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 743.791077][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 743.797272][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:36 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xe8030000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) 22:54:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) 22:54:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(pcbc(aes-aesni))\x00'}, 0x58) 22:54:37 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:37 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xf4010000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:54:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) 22:54:37 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) socketpair(0xa, 0x3, 0xff, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 744.591070][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 744.597068][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:37 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfc000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) 22:54:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) 22:54:37 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ud.\x00', 0x0, 0x0) 22:54:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3, 0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) unlink(&(0x7f0000000400)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r5, &(0x7f0000000000)={[{0x0, 'memory', 0x4002}]}, 0x201600) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0xfffffffffffffff8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x1800000000000000, 0x20, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d17", 0x0, 0x100}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu//yz1\f', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0xac, 0x80000000000, {"78f7f11e1d472b3c0cef3672e3872348a6848fe9fa57195080718ae85388796e3bd02fe2334a3b2d146bc7c6d2a47f70234ba891f409156efa3b5a5f522584968a51b427dbe67ea37549b10e9760fab926bb07520cfe312433de24c5814057f828248bf7a97fd1a29f7f2330b1c729966071f9197e605809783aacf0d740220e43f479482bb60a129b9c37a12a4df2d375da"}}, {0x0, "7144042d0c074b6db39a89e2538ee5c13c295ddfe99776af1a3fde1b53d398ed8b856439ea7eda6191df727d8c678818bace0ed10632320985834ccccfa1fe721a204670828cc158e0c59a783d517d12c70aff277b786659db095b34a934725aea4b23c9ef2c7f1015bb5d57eaace4a5bcea6b00675bc24e8a37f2a855acf3c8720d66cd0784db1abde10db5a1b7ca78f2cad214616919085f42f299ce21d4026c36e0084e70aa67ec35366839156ec38df82e5d36d3c97750ac701cd2f80e"}}, 0x0, 0x16d}, 0x20) [ 745.151076][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 745.156993][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:38 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfcff0000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) close(r0) 22:54:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) 22:54:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3, 0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000380), 0x0}, 0x18) unlink(&(0x7f0000000400)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r5, &(0x7f0000000000)={[{0x0, 'memory', 0x4002}]}, 0x201600) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0xfffffffffffffff8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x1800000000000000, 0x20, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d17", 0x0, 0x100}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu//yz1\f', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0xac, 0x80000000000, {"78f7f11e1d472b3c0cef3672e3872348a6848fe9fa57195080718ae85388796e3bd02fe2334a3b2d146bc7c6d2a47f70234ba891f409156efa3b5a5f522584968a51b427dbe67ea37549b10e9760fab926bb07520cfe312433de24c5814057f828248bf7a97fd1a29f7f2330b1c729966071f9197e605809783aacf0d740220e43f479482bb60a129b9c37a12a4df2d375da"}}, {0x0, "7144042d0c074b6db39a89e2538ee5c13c295ddfe99776af1a3fde1b53d398ed8b856439ea7eda6191df727d8c678818bace0ed10632320985834ccccfa1fe721a204670828cc158e0c59a783d517d12c70aff277b786659db095b34a934725aea4b23c9ef2c7f1015bb5d57eaace4a5bcea6b00675bc24e8a37f2a855acf3c8720d66cd0784db1abde10db5a1b7ca78f2cad214616919085f42f299ce21d4026c36e0084e70aa67ec35366839156ec38df82e5d36d3c97750ac701cd2f80e"}}, 0x0, 0x16d}, 0x20) 22:54:38 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ud/\x00', 0x0, 0x0) 22:54:38 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfdffffff, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) close(r0) 22:54:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) socketpair$unix(0x1, 0x0, 0x0, 0x0) 22:54:39 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x02', 0x0, 0x0) 22:54:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) close(r0) 22:54:39 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfe800000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:39 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\xf0', 0x0, 0x0) 22:54:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3805}) 22:54:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) write$binfmt_elf64(r1, 0x0, 0x35c) 22:54:39 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x14) close(0xffffffffffffffff) 22:54:39 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udfM', 0x0, 0x0) 22:54:39 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfec00000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:39 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000002100)) 22:54:39 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x14) close(0xffffffffffffffff) 22:54:39 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) 22:54:40 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x14) close(0xffffffffffffffff) 22:54:40 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfeffffff, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r2, 0x0, 0x8000) [ 747.144661][ T2488] print_req_error: 2 callbacks suppressed [ 747.144674][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 747.175569][ T2488] print_req_error: I/O error, dev loop0, sector 256 flags 0 [ 747.183460][T21059] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 747.236823][ T2489] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 747.244532][T21059] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 747.313939][T21059] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 747.340923][T21059] UDF-fs: Scanning with blocksize 512 failed [ 747.384120][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 747.395828][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 747.404311][T21059] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 747.455342][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 747.465512][T21059] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:40 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xff000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:40 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x2d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) [ 747.497378][T21059] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 747.546010][T21059] UDF-fs: Scanning with blocksize 1024 failed [ 747.577573][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 747.587269][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 747.596446][T21059] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 747.638883][ T2488] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 747.649862][T21059] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 747.673196][T21059] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 747.694748][T21059] UDF-fs: Scanning with blocksize 2048 failed [ 747.715029][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 747.723396][T21059] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 747.746185][T21059] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 747.758750][T21059] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 747.774034][T21059] UDF-fs: Scanning with blocksize 4096 failed [ 747.780361][T21059] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:40 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf&', 0x0, 0x0) 22:54:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:40 executing program 3: 22:54:40 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xffff1f00, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) 22:54:40 executing program 3: 22:54:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 22:54:40 executing program 3: 22:54:40 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\xc0', 0x0, 0x0) 22:54:40 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xffffff7f, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x14) close(r0) 22:54:41 executing program 3: 22:54:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:41 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:41 executing program 3: 22:54:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) close(r0) 22:54:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 22:54:41 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfffffffd, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:41 executing program 3: [ 748.350905][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 748.425928][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 748.461215][T22226] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:41 executing program 3: 22:54:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) close(r0) 22:54:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:41 executing program 3: [ 748.482371][T22226] UDF-fs: Scanning with blocksize 512 failed [ 748.515527][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 748.541239][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) close(r0) 22:54:41 executing program 3: [ 748.586755][T22226] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 748.600854][T22226] UDF-fs: Scanning with blocksize 1024 failed [ 748.620620][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 748.675049][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 748.696837][T22226] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 748.705169][T22226] UDF-fs: Scanning with blocksize 2048 failed [ 748.713038][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 748.723699][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 748.733888][T22226] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 748.742012][T22226] UDF-fs: Scanning with blocksize 4096 failed [ 748.748178][T22226] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 748.756756][ C0] net_ratelimit: 20 callbacks suppressed [ 748.756764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 748.756818][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 748.779232][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 748.790962][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 748.800625][T22226] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 748.809246][T22226] UDF-fs: Scanning with blocksize 512 failed [ 748.816124][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 748.827270][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 748.851100][T22226] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 748.858754][T22226] UDF-fs: Scanning with blocksize 1024 failed [ 748.865813][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 748.875581][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 748.885212][T22226] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 748.892906][T22226] UDF-fs: Scanning with blocksize 2048 failed [ 748.899493][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 748.909914][T22226] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 748.919532][T22226] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:41 executing program 3: 22:54:41 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfffffffe, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) close(r0) 22:54:41 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\xff', 0x0, 0x0) 22:54:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) [ 748.927216][T22226] UDF-fs: Scanning with blocksize 4096 failed [ 748.933354][T22226] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:41 executing program 3: 22:54:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) close(r0) 22:54:41 executing program 3: 22:54:42 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) close(r0) 22:54:42 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x8000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) sync() 22:54:42 executing program 3: [ 749.224627][T22970] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(0xffffffffffffffff) [ 749.291834][T22970] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 749.311055][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 749.316903][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 749.322785][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 749.323903][T22970] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 749.328557][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:42 executing program 3: [ 749.349542][T22970] UDF-fs: Scanning with blocksize 512 failed [ 749.363378][T22970] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 749.377082][T22970] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 749.387698][T22970] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 749.397432][T22970] UDF-fs: Scanning with blocksize 1024 failed 22:54:42 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x100000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 749.440668][T22970] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:42 executing program 3: 22:54:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(0xffffffffffffffff) [ 749.485887][T22970] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 749.526247][T22970] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 749.551102][T22970] UDF-fs: Scanning with blocksize 2048 failed [ 749.596992][T22970] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 749.721544][T22970] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 749.752732][T22970] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 749.788815][T22970] UDF-fs: Scanning with blocksize 4096 failed [ 749.814726][T22970] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:42 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:42 executing program 3: 22:54:42 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x200000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x14) close(0xffffffffffffffff) 22:54:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) [ 749.951056][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 749.956865][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 749.962709][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 749.968483][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:42 executing program 3: [ 750.094664][T23576] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) sendto$inet(0xffffffffffffffff, 0x0, 0x6d, 0x0, 0x0, 0x280) prctl$PR_GET_SECUREBITS(0x1b) [ 750.182405][T23576] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:43 executing program 5: [ 750.251957][T23576] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x32, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 22:54:43 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x300000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 750.311753][T23576] UDF-fs: Scanning with blocksize 512 failed 22:54:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 750.354663][T23576] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 750.396712][T23576] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 750.510337][T23576] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 750.555936][T23576] UDF-fs: Scanning with blocksize 1024 failed [ 750.591514][T23576] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 750.663671][T23576] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 750.721125][T23576] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 750.757412][T23576] UDF-fs: Scanning with blocksize 2048 failed [ 750.781888][T23576] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 750.842204][T23576] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 750.884224][T23576] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 750.921650][T23576] UDF-fs: Scanning with blocksize 4096 failed [ 750.927764][T23576] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:43 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) bind$inet(0xffffffffffffffff, 0x0, 0x2e3) prctl$PR_GET_SECUREBITS(0x1b) 22:54:43 executing program 5: clone(0x0, 0x0, 0x0, 0x0, 0x0) rename(0x0, 0x0) 22:54:43 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x400000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f00000007c0)={0xb2, {{0xa, 0x4e21, 0x3, @local, 0x8000}}, 0x0, 0x6, [{{0xa, 0x4e21, 0x4, @mcast2, 0x8}}, {{0xa, 0x4e22, 0xff, @local, 0x5}}, {{0xa, 0x4e22, 0xffff, @local, 0x7f}}, {{0xa, 0x4e23, 0x11b0, @mcast2, 0x8}}, {{0xa, 0x4e22, 0x6, @remote, 0x1}}, {{0xa, 0x4e21, 0x0, @remote, 0xfab6}}]}, 0x390) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r5, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffd1d) prctl$PR_GET_SECUREBITS(0x1b) [ 751.189049][ T26] audit: type=1326 audit(1553554484.037:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24046 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 751.225079][T24171] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 751.273291][T24171] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:44 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x500000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 751.338365][T24171] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYRES16=r0]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 751.403578][T24171] UDF-fs: Scanning with blocksize 512 failed [ 751.443679][T24171] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) prctl$PR_GET_SECUREBITS(0x1b) [ 751.503172][T24171] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 751.537440][T24171] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 751.578198][T24171] UDF-fs: Scanning with blocksize 1024 failed [ 751.606644][T24171] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 751.654827][T24171] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) prctl$PR_GET_SECUREBITS(0x1b) [ 751.695163][T24171] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 751.733432][T24171] UDF-fs: Scanning with blocksize 2048 failed [ 751.765487][T24171] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 751.817097][T24171] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 751.844472][T24171] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 751.866490][ T26] audit: type=1326 audit(1553554484.717:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24046 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 751.891274][T24171] UDF-fs: Scanning with blocksize 4096 failed 22:54:44 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:44 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x600000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 751.934850][T24171] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f00000007c0)={0xb2, {{0xa, 0x4e21, 0x3, @local, 0x8000}}, 0x0, 0x6, [{{0xa, 0x4e21, 0x4, @mcast2, 0x8}}, {{0xa, 0x4e22, 0xff, @local, 0x5}}, {{0xa, 0x4e22, 0xffff, @local, 0x7f}}, {{0xa, 0x4e23, 0x11b0, @mcast2, 0x8}}, {{0xa, 0x4e22, 0x6, @remote, 0x1}}, {{0xa, 0x4e21, 0x0, @remote, 0xfab6}}]}, 0x390) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r5, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) prctl$PR_GET_SECUREBITS(0x1b) [ 752.042633][T24823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 752.067195][T24823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x2, 0x1, 0x0) prctl$PR_GET_SECUREBITS(0x1b) [ 752.101135][T24823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 752.130243][ T26] audit: type=1326 audit(1553554484.977:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24977 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:45 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x700000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 752.182003][T24823] UDF-fs: Scanning with blocksize 512 failed [ 752.188619][ T2488] print_req_error: 65 callbacks suppressed [ 752.188628][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 752.248436][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 752.256153][T24823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) [ 752.314687][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 752.328690][T24823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0xbff}]}) 22:54:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) prctl$PR_GET_SECUREBITS(0x1b) [ 752.392270][T24823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 752.400449][T24823] UDF-fs: Scanning with blocksize 1024 failed [ 752.408875][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 752.417166][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 752.424888][T24823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 752.442933][ T2488] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 752.450726][T24823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 752.504749][T24823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 752.527044][T24823] UDF-fs: Scanning with blocksize 2048 failed [ 752.552024][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 752.560001][ T2488] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 752.568648][T24823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 752.579405][ T2488] print_req_error: I/O error, dev loop0, sector 4096 flags 0 [ 752.588104][T24823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:45 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:45 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xa00000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) prctl$PR_GET_SECUREBITS(0x1b) [ 752.598612][T24823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 752.607162][T24823] UDF-fs: Scanning with blocksize 4096 failed [ 752.614225][T24823] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 752.733135][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 752.740840][T25458] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 752.760059][T25458] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 752.772363][T25458] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 752.801473][T25458] UDF-fs: Scanning with blocksize 512 failed [ 752.808432][T25458] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 752.835591][T25458] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 752.846476][T25458] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 752.854656][T25458] UDF-fs: Scanning with blocksize 1024 failed [ 752.862031][T25458] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 752.871945][T25458] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 752.881704][T25458] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 752.889483][T25458] UDF-fs: Scanning with blocksize 2048 failed 22:54:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f00000007c0)={0xb2, {{0xa, 0x4e21, 0x3, @local, 0x8000}}, 0x0, 0x6, [{{0xa, 0x4e21, 0x4, @mcast2, 0x8}}, {{0xa, 0x4e22, 0xff, @local, 0x5}}, {{0xa, 0x4e22, 0xffff, @local, 0x7f}}, {{0xa, 0x4e23, 0x11b0, @mcast2, 0x8}}, {{0xa, 0x4e22, 0x6, @remote, 0x1}}, {{0xa, 0x4e21, 0x0, @remote, 0xfab6}}]}, 0x390) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r5, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:45 executing program 5: r0 = memfd_create(&(0x7f0000000040)=' \x81M\x8f\xec\x96\xbb}\xc1*\x02\xf2\x9e!\xfd\x93\xe7I\'\x00\\zn', 0x0) write(r0, &(0x7f00000001c0)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)) 22:54:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) prctl$PR_GET_SECUREBITS(0x1b) 22:54:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:45 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xe00000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:45 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\xff', 0x0, 0x0) [ 752.897389][T25458] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 752.907185][T25458] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 752.917031][T25458] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 752.924732][T25458] UDF-fs: Scanning with blocksize 4096 failed [ 752.930798][T25458] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:45 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) [ 753.036503][ T26] audit: type=1326 audit(1553554485.877:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25710 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:46 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xf00000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:46 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) 22:54:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RSTATu(r1, &(0x7f0000000040)=ANY=[], 0x445144e9) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) fdatasync(r1) 22:54:46 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 753.266202][T25989] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 753.306360][T25989] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 753.331144][T25989] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 753.338807][T25989] UDF-fs: Scanning with blocksize 512 failed [ 753.352665][T25989] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 753.367693][T25989] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 753.378503][T25989] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 753.398155][T25989] UDF-fs: Scanning with blocksize 1024 failed [ 753.418392][T25989] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 753.438915][T25989] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 753.448596][T25989] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 753.459992][T25989] UDF-fs: Scanning with blocksize 2048 failed [ 753.467157][T25989] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 753.477755][T25989] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 753.487415][T25989] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 753.495235][T25989] UDF-fs: Scanning with blocksize 4096 failed [ 753.501377][T25989] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f00000007c0)={0xb2, {{0xa, 0x4e21, 0x3, @local, 0x8000}}, 0x0, 0x6, [{{0xa, 0x4e21, 0x4, @mcast2, 0x8}}, {{0xa, 0x4e22, 0xff, @local, 0x5}}, {{0xa, 0x4e22, 0xffff, @local, 0x7f}}, {{0xa, 0x4e23, 0x11b0, @mcast2, 0x8}}, {{0xa, 0x4e22, 0x6, @remote, 0x1}}, {{0xa, 0x4e21, 0x0, @remote, 0xfab6}}]}, 0x390) r5 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r5, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:46 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) 22:54:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:46 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 22:54:46 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x1100000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:46 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\xfe', 0x0, 0x0) 22:54:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) [ 753.879489][ T26] audit: type=1326 audit(1553554486.727:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=26297 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:46 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000006180)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000140)=[@rights={0x18, 0x1, 0x1, [r0, r0]}], 0x18}], 0x1, 0x0) 22:54:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 754.021942][T26609] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:46 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x1800000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) [ 754.069638][T26609] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 754.091338][T26609] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 754.108161][T26609] UDF-fs: Scanning with blocksize 512 failed [ 754.114404][ C0] net_ratelimit: 20 callbacks suppressed [ 754.114413][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.114469][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 754.114557][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.114600][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 754.173238][T26609] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 754.184010][T26609] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 754.191087][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 754.194271][T26609] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 754.199414][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 754.213822][T26609] UDF-fs: Scanning with blocksize 1024 failed [ 754.220940][T26609] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 754.231795][T26609] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 754.243110][T26609] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 754.251603][T26609] UDF-fs: Scanning with blocksize 2048 failed [ 754.259285][T26609] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 754.269982][T26609] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 754.280384][T26609] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 754.296369][T26609] UDF-fs: Scanning with blocksize 4096 failed [ 754.305925][T26609] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f00000007c0)={0xb2, {{0xa, 0x4e21, 0x3, @local, 0x8000}}, 0x0, 0x6, [{{0xa, 0x4e21, 0x4, @mcast2, 0x8}}, {{0xa, 0x4e22, 0xff, @local, 0x5}}, {{0xa, 0x4e22, 0xffff, @local, 0x7f}}, {{0xa, 0x4e23, 0x11b0, @mcast2, 0x8}}, {{0xa, 0x4e22, 0x6, @remote, 0x1}}, {{0xa, 0x4e21, 0x0, @remote, 0xfab6}}]}, 0x390) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000440)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/\xe4\x1b\xd7\xfe\xab\xa8\xa8Z\x0fGof\xdbr\x8bzM\"\x95Rh=\xbfc}\xa0\x19\xb9\xf8R\xa4\x18\xca\xa2\xe8\xc1/\x84\bhX\x8c\xb2[\xf8u\x8e\x84\x1dL\xcc\xf0\x14\xb8V\xdfV\x99\x88\tJ@O\x81\xbf\xb6y8\xc3S\'X;\xc1\x0e\xd3^\x89F\xf3\xf7D') sendfile(r0, r1, &(0x7f0000000040), 0x1) 22:54:47 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x2000000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:47 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) 22:54:47 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\xff', 0x0, 0x0) 22:54:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) [ 754.735492][ T26] audit: type=1326 audit(1553554487.587:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=26868 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:47 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:47 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x2c01000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:47 executing program 5: setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x80000000000004, 0x200, 0x39d, 0x0, 0xffffffffffffff9c}, 0x2c) 22:54:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) 22:54:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 754.902242][T27169] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 754.939660][T27169] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 754.980573][T27169] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 754.991088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.996957][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 755.015166][T27169] UDF-fs: Scanning with blocksize 512 failed [ 755.025839][T27169] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 755.037097][T27169] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 755.054337][T27169] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 755.063390][T27169] UDF-fs: Scanning with blocksize 1024 failed [ 755.072746][T27169] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 755.083260][T27169] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 755.099468][T27169] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 755.108831][T27169] UDF-fs: Scanning with blocksize 2048 failed [ 755.117902][T27169] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 755.128765][T27169] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 755.139752][T27169] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 755.149420][T27169] UDF-fs: Scanning with blocksize 4096 failed [ 755.156405][T27169] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:48 executing program 5: 22:54:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) 22:54:48 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x4c01000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:48 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) [ 755.551050][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 755.556931][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 755.584199][T27397] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:48 executing program 5: [ 755.619138][ T26] audit: type=1326 audit(1553554488.467:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=27398 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 755.642843][T27397] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 755.662106][T27397] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 755.688531][T27397] UDF-fs: Scanning with blocksize 512 failed [ 755.697258][T27397] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:48 executing program 5: 22:54:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) 22:54:48 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xe803000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 755.718897][T27397] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 755.738084][T27397] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 755.747596][T27397] UDF-fs: Scanning with blocksize 1024 failed [ 755.777626][T27397] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 755.824039][T27397] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 755.845141][T27397] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 755.860600][T27397] UDF-fs: Scanning with blocksize 2048 failed [ 755.867923][T27397] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 755.885931][T27397] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 755.907405][T27397] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 755.916720][T27397] UDF-fs: Scanning with blocksize 4096 failed [ 755.923063][T27397] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:49 executing program 5: 22:54:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) 22:54:49 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xf401000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:49 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:49 executing program 5: [ 756.454883][T27821] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_GET_SECUREBITS(0x1b) [ 756.490006][ T26] audit: type=1326 audit(1553554489.337:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=27838 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 756.499713][T27821] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 756.542960][T27821] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:49 executing program 5: [ 756.563595][T27821] UDF-fs: Scanning with blocksize 512 failed [ 756.583785][T27821] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 756.600204][T27821] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_GET_SECUREBITS(0x1b) 22:54:49 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfc00000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 756.626036][T27821] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 756.640548][T27821] UDF-fs: Scanning with blocksize 1024 failed [ 756.662767][T27821] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 756.710034][T27821] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 756.730497][T27821] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 756.740240][T27821] UDF-fs: Scanning with blocksize 2048 failed [ 756.760750][T27821] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 756.784423][T27821] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 756.798430][T27821] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 756.806344][T27821] UDF-fs: Scanning with blocksize 4096 failed [ 756.812843][T27821] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:50 executing program 5: 22:54:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_GET_SECUREBITS(0x1b) 22:54:50 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfcff000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:50 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:50 executing program 5: [ 757.343136][ T2488] print_req_error: 71 callbacks suppressed [ 757.343149][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 757.366054][ T2489] print_req_error: I/O error, dev loop0, sector 256 flags 0 [ 757.374474][T28258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:50 executing program 5: [ 757.390512][ T26] audit: type=1326 audit(1553554490.247:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=28260 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:50 executing program 4: [ 757.439921][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 757.449219][T28258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:50 executing program 5: 22:54:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 757.489985][T28258] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:50 executing program 4: [ 757.536201][T28258] UDF-fs: Scanning with blocksize 512 failed [ 757.557673][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 757.565364][ T2489] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 757.578809][T28258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 757.608764][ T2489] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 757.620062][T28258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 757.641242][T28258] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 757.656664][T28258] UDF-fs: Scanning with blocksize 1024 failed [ 757.663709][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 757.671504][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 757.679083][T28258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 757.689120][ T2489] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 757.698847][T28258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 757.721775][T28258] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 757.729572][T28258] UDF-fs: Scanning with blocksize 2048 failed [ 757.736409][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 757.744026][T28258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 757.757512][T28258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 757.767296][T28258] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 757.775906][T28258] UDF-fs: Scanning with blocksize 4096 failed [ 757.782234][T28258] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:51 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfdffffff00000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000040)) 22:54:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:51 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 758.277274][T28595] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 758.301919][ T26] audit: type=1326 audit(1553554491.157:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=28591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 758.326838][T28595] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 758.359343][T28595] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:51 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfe80000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 758.392427][T28595] UDF-fs: Scanning with blocksize 512 failed [ 758.409647][T28595] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:51 executing program 4: connect$l2tp(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) [ 758.487367][T28595] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 758.510551][T28595] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 758.571405][T28595] UDF-fs: Scanning with blocksize 1024 failed [ 758.599138][T28595] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:51 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfec0000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 758.622568][T28595] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 758.648040][T28595] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 758.668470][T28595] UDF-fs: Scanning with blocksize 2048 failed [ 758.712333][T28595] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 758.753464][T28595] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 758.769595][T28595] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 758.779772][T28595] UDF-fs: Scanning with blocksize 4096 failed [ 758.794553][T28595] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:51 executing program 4: request_key(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0) 22:54:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:51 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:54:51 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xfeffffff00000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000024c0)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002380)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000380)="06ee6204002a52c177d1a89976e091", 0xf}], 0x1, 0x0, 0x0, 0x880}], 0x1, 0x4000000) [ 759.141455][T29443] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 759.161079][ C0] net_ratelimit: 20 callbacks suppressed [ 759.161088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 759.172581][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 759.204809][ T26] audit: type=1326 audit(1553554492.057:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=29446 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 759.222694][T29443] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 759.245711][T29443] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:52 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xff00000000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 759.285717][T29443] UDF-fs: Scanning with blocksize 512 failed [ 759.307781][T29443] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 759.322909][T29443] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 759.351243][T29443] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 759.376313][T29443] UDF-fs: Scanning with blocksize 1024 failed [ 759.408387][T29443] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 759.440196][T29443] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:52 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000080)) 22:54:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 759.458277][T29443] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 759.484394][T29443] UDF-fs: Scanning with blocksize 2048 failed [ 759.515264][T29443] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 759.546925][T29443] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 759.573528][T29443] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 759.586930][T29443] UDF-fs: Scanning with blocksize 4096 failed [ 759.594458][T29443] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 759.711050][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 759.716873][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 759.722692][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 759.728447][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r3, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:52 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xffff1f0000000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400001, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$tipc(r0, &(0x7f0000002140)={&(0x7f0000001d00)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xf000000}}, 0x10, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) getpid() 22:54:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:52 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 760.077887][T29988] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 760.099031][ T26] audit: type=1326 audit(1553554492.947:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=30000 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 760.101426][T29988] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:53 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$tipc(r0, &(0x7f0000000040)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, 0x0}, 0x0) [ 760.157464][T29988] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 760.201558][T29988] UDF-fs: Scanning with blocksize 512 failed [ 760.216948][T29988] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:53 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xffffff7f00000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 760.267263][T29988] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:53 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 760.307477][T29988] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 760.338090][T29988] UDF-fs: Scanning with blocksize 1024 failed [ 760.345765][T29988] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:53 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002140)={&(0x7f0000001d00)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xf000000}}, 0x10, 0x0}, 0x0) [ 760.357412][T29988] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 760.361042][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 760.367373][T29988] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 760.372772][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 760.372849][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 760.380678][T29988] UDF-fs: Scanning with blocksize 2048 failed [ 760.386234][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:53 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 760.469212][T29988] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 760.497855][T29988] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 760.544359][T29988] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 760.555889][T29988] UDF-fs: Scanning with blocksize 4096 failed [ 760.563440][T29988] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r2, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:53 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0xffffffff00000000, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r2, r3) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x43102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 22:54:53 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:53 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x2, 0x0) [ 760.936762][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 760.959477][ T26] audit: type=1326 audit(1553554493.807:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=30619 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:53 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 760.961218][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:53 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000002}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 761.036167][T30616] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 761.059606][T30616] UDF-fs: Scanning with blocksize 512 failed 22:54:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:53 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 761.089916][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = dup2(r1, r1) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) write$P9_RREMOVE(r2, 0x0, 0x0) [ 761.132944][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 761.158247][T30616] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 761.174396][T30616] UDF-fs: Scanning with blocksize 1024 failed [ 761.196052][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 761.240183][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 761.256969][T30616] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 761.265651][T30616] UDF-fs: Scanning with blocksize 2048 failed 22:54:54 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 761.283115][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 761.299951][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 761.318845][T30616] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 761.327126][T30616] UDF-fs: Scanning with blocksize 4096 failed [ 761.340361][T30616] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 761.369334][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 761.385023][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 761.394846][T30616] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 761.402688][T30616] UDF-fs: Scanning with blocksize 512 failed [ 761.409521][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 761.421717][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 761.433851][T30616] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 761.443055][T30616] UDF-fs: Scanning with blocksize 1024 failed [ 761.449929][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 761.459833][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 761.470089][T30616] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 761.477886][T30616] UDF-fs: Scanning with blocksize 2048 failed [ 761.484730][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 761.494613][T30616] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 761.504234][T30616] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 761.511946][T30616] UDF-fs: Scanning with blocksize 4096 failed [ 761.518007][T30616] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r2, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:54 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000003}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0xfffffffd) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r2, r3) creat(&(0x7f0000000100)='./file1\x00', 0x0) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x841, 0x0) clone(0x43102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 22:54:54 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf0, 0x0) 22:54:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:54 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x264d, 0x0) [ 761.829877][ T26] audit: type=1326 audit(1553554494.677:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31253 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:54 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000004}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:54 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x3f00, 0x0) 22:54:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000580)={0x11, 0x1f, r2, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x11}}, 0x14) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:55 executing program 4: 22:54:55 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000001480)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:55 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x4d26, 0x0) 22:54:55 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000005}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:55 executing program 4: 22:54:55 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:55 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 762.724591][ T26] audit: type=1326 audit(1553554495.577:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=31782 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:55 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xedc0, 0x0) 22:54:55 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000006}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:55 executing program 4: 22:54:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000640)=""/211) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = gettid() socket$unix(0x1, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0xfffffffffffffe3e) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_getres(0x0, 0x0) getgroups(0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, 0x0, 0xfffffffffffffffd) getrandom(&(0x7f00000000c0)=""/101, 0x65, 0x3) recvmmsg(r2, &(0x7f0000003740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=""/247, 0xf7}}], 0x1, 0x100, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) tkill(r0, 0x2001000000000016) 22:54:56 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf000, 0x0) 22:54:56 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000007}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 763.600758][ T26] audit: type=1326 audit(1553554496.447:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=32114 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:56 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf0ffff, 0x0) 22:54:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:56 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000008}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x6841, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) write$P9_RSYMLINK(r0, 0x0, 0x0) 22:54:56 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x1000000, 0x0) [ 763.907748][ T2488] print_req_error: 62 callbacks suppressed [ 763.907761][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 763.922266][ T2488] print_req_error: I/O error, dev loop0, sector 256 flags 0 [ 763.929769][T32606] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 763.945254][ T2489] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 763.953137][T32606] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 763.971171][T32606] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 763.979022][T32606] UDF-fs: Scanning with blocksize 512 failed [ 763.997269][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 764.005251][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 764.012800][T32606] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 764.022885][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 764.030437][T32606] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 764.040493][T32606] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 764.048318][T32606] UDF-fs: Scanning with blocksize 1024 failed [ 764.054979][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 764.062641][ T2489] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 764.070054][T32606] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 764.079891][ T2488] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 764.087700][T32606] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 764.097703][T32606] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 764.105743][T32606] UDF-fs: Scanning with blocksize 2048 failed [ 764.112540][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 764.119888][T32606] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 764.130278][T32606] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 764.139923][T32606] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 764.147625][T32606] UDF-fs: Scanning with blocksize 4096 failed [ 764.153762][T32606] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = semget(0x2, 0x5, 0x780) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000640)=""/211) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = timerfd_create(0x0, 0x0) timerfd_gettime(r4, &(0x7f0000000600)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r3, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r5, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:57 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000009}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:57 executing program 4: semget$private(0x0, 0x0, 0x20) semget(0x1, 0x3, 0x300) 22:54:57 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x2000000, 0x0) [ 764.478077][ T26] audit: type=1326 audit(1553554497.327:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=32736 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 764.500168][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 764.511095][ C0] net_ratelimit: 20 callbacks suppressed [ 764.511103][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.522567][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:54:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:57 executing program 4: [ 764.528395][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.534188][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 764.541419][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000001480)) r3 = timerfd_create(0x0, 0x0) timerfd_gettime(r3, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 764.585690][T32744] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 764.593538][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 764.593599][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:57 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00000a}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:57 executing program 4: [ 764.666565][T32744] UDF-fs: Scanning with blocksize 512 failed [ 764.679853][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 764.707667][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 764.732935][T32744] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:54:57 executing program 4: [ 764.768924][T32744] UDF-fs: Scanning with blocksize 1024 failed [ 764.797325][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 764.825384][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 764.866622][T32744] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 764.904917][T32744] UDF-fs: Scanning with blocksize 2048 failed [ 764.920255][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 764.939068][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 764.949105][T32744] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 764.957782][T32744] UDF-fs: Scanning with blocksize 4096 failed [ 764.964283][T32744] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 764.976832][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 764.986980][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 764.996596][T32744] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 765.004277][T32744] UDF-fs: Scanning with blocksize 512 failed [ 765.010806][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 765.020647][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 765.030348][T32744] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 765.038028][T32744] UDF-fs: Scanning with blocksize 1024 failed [ 765.044775][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 765.054575][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 765.064171][T32744] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 765.071998][T32744] UDF-fs: Scanning with blocksize 2048 failed [ 765.078454][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 765.088241][T32744] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 765.097837][T32744] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 765.105498][T32744] UDF-fs: Scanning with blocksize 4096 failed [ 765.111606][T32744] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0x2, 0x5, 0x780) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) 22:54:58 executing program 4: 22:54:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000001480)) r3 = timerfd_create(0x0, 0x0) timerfd_gettime(r3, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:58 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00000b}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:58 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x3f000000, 0x0) [ 765.315797][ T699] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 765.343557][ T26] audit: type=1326 audit(1553554498.197:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=701 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:58 executing program 4: 22:54:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000100)={0x0, 0xfffffffffffffe00}) [ 765.349267][ T699] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 765.391064][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.396884][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 765.443103][ T699] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 765.461311][ T699] UDF-fs: Scanning with blocksize 512 failed 22:54:58 executing program 4: 22:54:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000001480)) r3 = timerfd_create(0x0, 0x0) timerfd_gettime(r3, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:58 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00000c}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 765.502282][ T699] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 765.531779][ T699] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:54:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, 0x0) [ 765.573976][ T699] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 765.609830][ T699] UDF-fs: Scanning with blocksize 1024 failed [ 765.633314][ T699] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 765.649351][ T699] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 765.666016][ T699] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 765.675602][ T699] UDF-fs: Scanning with blocksize 2048 failed [ 765.688220][ T699] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 765.720622][ T699] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 765.730750][ T699] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 765.754622][ T699] UDF-fs: Scanning with blocksize 4096 failed [ 765.776056][ T699] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 765.951120][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 765.956965][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:59 executing program 4: 22:54:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) mq_open(&(0x7f00005a1ffb)='wlc\x00', 0x41, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000001480)) r3 = timerfd_create(0x0, 0x0) timerfd_gettime(r3, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r2, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, 0x0) 22:54:59 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00000d}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:59 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x4d260000, 0x0) 22:54:59 executing program 4: 22:54:59 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xc0ed0000, 0x0) [ 766.214290][ T26] audit: type=1326 audit(1553554499.067:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=1132 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:54:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) socket$unix(0x1, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000001480)) r3 = timerfd_create(0x0, 0x0) timerfd_gettime(r3, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r2, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, 0x0) [ 766.349184][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:54:59 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00000e}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:59 executing program 4: [ 766.391852][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 766.419617][ T1233] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 766.441566][ T1233] UDF-fs: Scanning with blocksize 512 failed [ 766.468483][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 766.512664][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 766.531170][ T1233] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 766.549733][ T1233] UDF-fs: Scanning with blocksize 1024 failed [ 766.586774][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 766.597250][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 766.614655][ T1233] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 766.626359][ T1233] UDF-fs: Scanning with blocksize 2048 failed [ 766.634675][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 766.644851][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 766.654528][ T1233] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 766.662237][ T1233] UDF-fs: Scanning with blocksize 4096 failed [ 766.668314][ T1233] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 766.680915][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 766.690818][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 766.700463][ T1233] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 766.710582][ T1233] UDF-fs: Scanning with blocksize 512 failed [ 766.717263][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 766.727099][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 766.736760][ T1233] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 766.744478][ T1233] UDF-fs: Scanning with blocksize 1024 failed [ 766.751239][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 766.762464][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 766.772124][ T1233] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 766.779762][ T1233] UDF-fs: Scanning with blocksize 2048 failed [ 766.786547][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 766.796320][ T1233] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 766.805954][ T1233] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 766.813640][ T1233] UDF-fs: Scanning with blocksize 4096 failed [ 766.819721][ T1233] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:54:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:54:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x100000000000002) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000001480)) r3 = timerfd_create(0x0, 0x0) timerfd_gettime(r3, &(0x7f0000000600)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r2, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:54:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)) 22:54:59 executing program 4: 22:54:59 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00000f}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:54:59 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfeffffff, 0x0) 22:54:59 executing program 4: 22:54:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)) 22:54:59 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffff000, 0x0) [ 767.103383][ T26] audit: type=1326 audit(1553554499.957:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=1382 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:55:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000001480)) r2 = timerfd_create(0x0, 0x0) timerfd_gettime(r2, &(0x7f0000000600)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r1, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r3, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:00 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000010}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:00 executing program 4: 22:55:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)) 22:55:00 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffffffe, 0x0) 22:55:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @broadcast}}}, 0x0) 22:55:00 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000011}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:00 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000001480)) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="1805000000000000002485be36d27090"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 767.977893][ T26] audit: type=1326 audit(1553554500.827:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=1611 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:55:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0x4b47, 0x0) 22:55:00 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xedc000000000, 0x0) 22:55:01 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000001480)) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:01 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xc4000141041, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5815c18d2ebb6691e2c51db298d9915538e841b2fc0c144c68dcc9468ec983e52c7b82d554ff6360987a115b0381db6708e37b9e123128b55175a43d02785435", "7ab1017c5afa6e0f54c43328b4a9dc9ad335885c2d19246f5c0cd45f8d55167c315f55acea5c4166fc4b73b601d17e17928a7dc78f92f48d5f49b2b7b12e3ae3", "1ef0657733f47caabbb15ebe563cac2a6e06a8a2ddaed7c5307101588ce1c6f5"}) 22:55:01 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000012}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:01 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf0ffffffffffff, 0x0) 22:55:01 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000001480)) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:01 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b705dfd2da7513b1504d2c6ae8754c61cadef5aa5bcd9f60a77dd69800c2882959892ef40f179a4337486468676f9d46b5c93475e790ff53842e87543fa22827", "9aaec102f8fdfd2d4b43e3083b4c7f43b7c248eff42741a60ae40d574d2076a4cce87d63fc312b71e0de729568e12c73e0b1ff29ab90845842bd2301bf195a12", "26f41b94465468d51ac3c7d3267d6134a3e12d8a7779df46f29e7dd0c2c957cc"}) 22:55:01 executing program 5: keyctl$KEYCTL_PKEY_ENCRYPT(0x3, &(0x7f00000001c0), 0x0, 0x0, 0x0) 22:55:01 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000013}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:01 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x232, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1010}, {&(0x7f0000000240)=""/147, 0x6a6}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x2, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) [ 768.836144][ T26] audit: type=1326 audit(1553554501.687:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=2045 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:55:01 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x100000000000000, 0x0) 22:55:01 executing program 5: r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40010000, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000a40)={r1}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x2761, 0x0) write$cgroup_int(r3, 0x0, 0x29f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f00000007c0)='(\x00'}, 0xfffffffffffffdca) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000280), 0x9a7244ead1ae4f93) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0xc0189436, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cg\x88z1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000840)) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socket$kcm(0xa, 0x2, 0x73) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x541b, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 22:55:01 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000001480)) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:01 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000014}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:01 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x200000000000000, 0x0) [ 769.551151][ C0] net_ratelimit: 20 callbacks suppressed [ 769.551197][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 769.562682][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:55:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:02 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x3f00000000000000, 0x0) 22:55:02 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$tipc(r0, &(0x7f0000002140)={&(0x7f0000001d00)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0xf000000}}, 0x10, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) getpid() 22:55:02 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:02 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000015}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000000000200bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000001016d400600000000006506000001ed00003f140000000000006f460000000000006b0a00fe00000000850000002e000000b7070000000000009500000000000000"], 0x0}, 0x48) 22:55:02 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x4d26000000000000, 0x0) 22:55:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x36, 0x0, &(0x7f00000003c0)="e460cdfbef24080000000a9b86dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d500000001000000140000150024", 0x0}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) [ 769.744410][ T26] audit: type=1326 audit(1553554502.597:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=2499 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 22:55:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x36, 0x0, &(0x7f00000003c0)="e460cdfbef24080000000a9b86dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d500000001000000140000150024", 0x0}, 0x28) 22:55:02 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) timerfd_create(0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:02 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000016}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:02 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfeffffff00000000, 0x0) [ 770.111064][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 770.116889][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 770.122712][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 770.128596][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:55:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x6b5) 22:55:03 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xffffffff00000000, 0x0) 22:55:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x36, 0x0, &(0x7f00000003c0)="e460cdfbef24080000000a9b86dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d500000001000000140000150024", 0x0}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 22:55:03 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) timerfd_create(0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:03 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000017}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:03 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffffffffffff000, 0x0) 22:55:03 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x10) 22:55:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:03 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) timerfd_create(0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:03 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000018}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:03 executing program 4: r0 = socket$inet(0x10, 0x3, 0x400000000000004) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 770.751089][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 770.757474][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 770.763397][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 770.769159][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:55:03 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2e2f4b696c6530008ac13ef45374fefd4f78377114521f9bc98f53e5bca6e44ae6583a867dbceeb7cbafb8eb2aec0fd5911f32a1423942afe37b9a805d67b1803d73"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8, 0x30080) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x27, &(0x7f0000000240)={0x2, 0x3, 0x7fffffff, 0x3, r1}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) read(r0, &(0x7f0000000280)=""/77, 0x4d) 22:55:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:03 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000600)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000000)="af", 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001940)={0x0, 0x20d5b90f, 0x0}, 0x2) 22:55:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:03 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3ff, 0x1) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x1, [0x9f0b]}, &(0x7f0000000180)=0x6) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) linkat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x1400) 22:55:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:03 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000019}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:04 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4c00) io_setup(0x8, &(0x7f0000000080)=0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) [ 771.187149][ T3499] kvm [3449]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000004 [ 771.203608][ T2488] print_req_error: 62 callbacks suppressed [ 771.203620][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 771.218397][ T2488] print_req_error: I/O error, dev loop0, sector 256 flags 0 22:55:04 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) [ 771.232499][ T3489] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 771.298528][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 771.306287][ T3489] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 771.330593][ T3489] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:04 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00001a}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 771.348289][ T3489] UDF-fs: Scanning with blocksize 512 failed [ 771.376617][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 771.386962][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 22:55:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) [ 771.396343][ T3489] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) [ 771.441365][ T2489] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 771.448951][ T3489] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 771.461403][ T3489] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 771.507839][ T3489] UDF-fs: Scanning with blocksize 1024 failed [ 771.527074][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 771.539619][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 771.548698][ T3489] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:04 executing program 4: 22:55:04 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00001b}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) [ 771.636783][ T2488] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 771.644686][ T3489] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 771.656269][ T4056] kvm [4049]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000004 [ 771.711521][ T3489] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 771.749887][ T3489] UDF-fs: Scanning with blocksize 2048 failed [ 771.768202][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 771.776273][ T3489] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 771.786804][ T3489] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 771.796803][ T3489] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 771.804925][ T3489] UDF-fs: Scanning with blocksize 4096 failed [ 771.811195][ T3489] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 771.826526][ T3642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 771.843157][ T3642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 771.853111][ T3642] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 771.860777][ T3642] UDF-fs: Scanning with blocksize 512 failed [ 771.867732][ T3642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 771.877594][ T3642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 771.887214][ T3642] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 771.895623][ T3642] UDF-fs: Scanning with blocksize 1024 failed [ 771.902439][ T3642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 771.912267][ T3642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 771.921916][ T3642] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 771.929537][ T3642] UDF-fs: Scanning with blocksize 2048 failed [ 771.936396][ T3642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 771.946182][ T3642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 771.955909][ T3642] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:04 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000040)=""/45, 0x2d) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:04 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:04 executing program 4: 22:55:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:04 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00001c}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 771.963619][ T3642] UDF-fs: Scanning with blocksize 4096 failed [ 771.969684][ T3642] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:05 executing program 4: [ 772.133620][ T4183] kvm [4164]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000004 22:55:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:05 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x10000, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:05 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00001d}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 772.221959][ T4258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:05 executing program 4: [ 772.296010][ T4258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 772.334047][ T4258] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 772.372958][ T4258] UDF-fs: Scanning with blocksize 512 failed [ 772.414530][ T4258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 772.457818][ T4312] kvm [4282]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000004 [ 772.472923][ T4258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 772.521681][ T4258] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 772.577162][ T4258] UDF-fs: Scanning with blocksize 1024 failed [ 772.599124][ T4258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 772.625662][ T4258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 772.656009][ T4258] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 772.676239][ T4258] UDF-fs: Scanning with blocksize 2048 failed [ 772.697116][ T4258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 772.713325][ T4258] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 772.723022][ T4258] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 772.730790][ T4258] UDF-fs: Scanning with blocksize 4096 failed [ 772.737018][ T4258] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 772.755111][ T4387] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 772.771438][ T4387] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 772.791076][ T4387] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 772.809592][ T4387] UDF-fs: Scanning with blocksize 512 failed [ 772.830108][ T4387] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 772.850574][ T4387] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 772.874957][ T4387] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 772.888355][ T4387] UDF-fs: Scanning with blocksize 1024 failed [ 772.896156][ T4387] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 772.906088][ T4387] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 772.915730][ T4387] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 772.923516][ T4387] UDF-fs: Scanning with blocksize 2048 failed 22:55:05 executing program 4: 22:55:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:05 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00001e}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:05 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x40) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:05 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0xe45) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) [ 772.930084][ T4387] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 772.939970][ T4387] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 772.949587][ T4387] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 772.957269][ T4387] UDF-fs: Scanning with blocksize 4096 failed [ 772.963406][ T4387] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:05 executing program 4: 22:55:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:06 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 773.140319][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:06 executing program 4: [ 773.199021][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:06 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000021}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 773.256023][ T4399] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 773.287558][ T4399] UDF-fs: Scanning with blocksize 512 failed 22:55:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) [ 773.356538][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:06 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x8) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:06 executing program 4: [ 773.405030][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 773.437263][ T4399] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 773.499593][ T4399] UDF-fs: Scanning with blocksize 1024 failed [ 773.528283][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 773.554555][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 773.576786][ T4399] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 773.586512][ T4399] UDF-fs: Scanning with blocksize 2048 failed [ 773.593708][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 773.614865][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 773.625323][ T4399] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 773.633399][ T4399] UDF-fs: Scanning with blocksize 4096 failed [ 773.639757][ T4399] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 773.658554][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 773.668677][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 773.678574][ T4399] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 773.686329][ T4399] UDF-fs: Scanning with blocksize 512 failed [ 773.692990][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 773.703156][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 773.712865][ T4399] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 773.720515][ T4399] UDF-fs: Scanning with blocksize 1024 failed [ 773.727367][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 773.737170][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 773.746846][ T4399] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 773.754538][ T4399] UDF-fs: Scanning with blocksize 2048 failed 22:55:06 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000022}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), &(0x7f0000356000)) 22:55:06 executing program 4: 22:55:06 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:06 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x80, 0x0) write$P9_RREADDIR(r0, &(0x7f00000001c0)={0x109, 0x29, 0x2, {0x10001, [{{0x40, 0x0, 0x5}, 0xd7, 0xfffffffffffffffd, 0x7, './file0'}, {{0x42, 0x1, 0x3}, 0xe16, 0x3ff, 0x7, './file0'}, {{0x20, 0x3, 0x3}, 0x4, 0x3, 0x7, './file0'}, {{0x18, 0x4, 0x3}, 0x4, 0x3ff, 0x7, './file0'}, {{0x0, 0x2, 0x8}, 0x4, 0x0, 0xd, './file0/file0'}, {{0xb9, 0x2, 0x3}, 0x400, 0x8, 0x7, './file0'}, {{0x22, 0x0, 0x2}, 0x7fffffff, 0xfff, 0x7, './file0'}, {{0xc1, 0x2, 0x1}, 0x9, 0x4, 0x7, './file0'}]}}, 0x109) 22:55:06 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(r0, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 773.762220][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 773.772031][ T4399] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 773.781684][ T4399] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 773.789339][ T4399] UDF-fs: Scanning with blocksize 4096 failed [ 773.795618][ T4399] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:06 executing program 4: 22:55:06 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, 0x0, &(0x7f0000356000)) [ 773.973212][ T4634] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:06 executing program 4: 22:55:06 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000004c0)="e06fc5aee757941c006341998ffcc70e411a54aac4b106379da0", 0x1a}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:06 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:06 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000023}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 774.039797][ T4634] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, 0x0, &(0x7f0000356000)) [ 774.111213][ T4634] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 774.149077][ T4634] UDF-fs: Scanning with blocksize 512 failed 22:55:07 executing program 4: 22:55:07 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) [ 774.169811][ T4634] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 774.299217][ T4634] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 774.346399][ T4634] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 774.360028][ T4634] UDF-fs: Scanning with blocksize 1024 failed [ 774.368266][ T4634] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 774.379594][ T4634] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 774.389876][ T4634] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 774.398205][ T4634] UDF-fs: Scanning with blocksize 2048 failed [ 774.405035][ T4634] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 774.414842][ T4634] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 774.424537][ T4634] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 774.434160][ T4634] UDF-fs: Scanning with blocksize 4096 failed [ 774.440344][ T4634] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 774.452729][ T4683] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 774.462625][ T4683] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 774.472359][ T4683] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 774.480113][ T4683] UDF-fs: Scanning with blocksize 512 failed [ 774.487031][ T4683] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 774.496933][ T4683] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 774.506583][ T4683] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 774.514380][ T4683] UDF-fs: Scanning with blocksize 1024 failed [ 774.520934][ T4683] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 774.530790][ T4683] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 774.540426][ T4683] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 774.548819][ T4683] UDF-fs: Scanning with blocksize 2048 failed [ 774.555562][ T4683] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 774.565753][ T4683] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 774.575426][ T4683] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 774.583446][ T4683] UDF-fs: Scanning with blocksize 4096 failed 22:55:07 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e082e3636ecea5ac7a492b8de8832317b7f00696c65300026343cd21a65777dea4ee44481e2b46f8c691e8d5c388f76bfdc735b46428eab4a1c3af94397e912fcbb002be18b025a2323c42f87e833c93f389affe0157706c5446185c4f7a49d696ea4af554b338fce85c0c018594729e7365f59f2310ad77608a304eeaf0f1fb07b8a21830e4e54027d51296973aac2bb987099d2f2ddea8c2b3407272524e11b38fd9ad4ca2833a50b856cc9c515ac0bd64d33bde98d76d00df1f5a9768d130295fade5d"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:07 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x10001, 0x0, 0x0, 0x1}, 0x2c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}, 0x0) write$cgroup_type(r1, &(0x7f0000000400)='threaded\x00', 0x9) write$cgroup_type(r3, &(0x7f0000000100)='threaded\x00', 0xfffffdef) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x1000) 22:55:07 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:07 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000024}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, 0x0, &(0x7f0000356000)) [ 774.589517][ T4683] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:07 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, &(0x7f0000738fc0), 0x0) 22:55:07 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000011c0)={0x3, 'veth0_to_team\x00', 0x1}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:07 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f6669cf8000004ee840909843b574463c8b40a6da481251a1f427907f121b7aeccce71bac223c14fae7c6126831b2a82547cd3f0dc6176b3dd8341d556ac7889a8e7e403ef746d274916c91663b62110f8b540000000000ae4d9ce4202008a700aedfda28130bd45d201e7bd318dff8714dce52abdb0152f1b35ae3768fdd7b2c0e153fa5f66032b0c41169caf5732ff51d321517fad784533f40464205"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x800, 0x181200) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xfffffffffffffdb7) syz_mount_image$minix(&(0x7f00000004c0)='minix\x00', &(0x7f0000000500)='./file0\x00', 0x3, 0x4, &(0x7f0000001680)=[{&(0x7f0000000540)="ccda86675ca27164df813c38483979ccccd33d84edc64cfd7f49da96e8", 0x1d, 0x8}, {&(0x7f0000000580)="6179e1c6839621f7d4cc4f995f87ee7b9e55336b77b37579fb0381", 0x1b}, {&(0x7f00000005c0)="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", 0x1000, 0x4}, {&(0x7f00000015c0)="a03da13588ea711e04bbff5013eaf5977052858097d6beab0678005557453a9391c9a001d33d1771ce0463c58d14018fda6cb890068ae9f153571d580d73e55cb4bd4586d1127c27d32b1a6843a8d23d75af7290186865c3ee3516b52092b604eb80d365325659936f8c05ef319835da4f9f5cfc2853653c7238fb6e0dc69326c98fb273fe3f57d10e955424a0324e4771a1715f6a69ea4e", 0x98}], 0x8, 0x0) r2 = geteuid() setreuid(r1, r2) rt_sigaction(0xb, &(0x7f0000000280)={&(0x7f00000000c0)="6667f04200bd00000000c4c1fd10f9c4427933723c360f949a9e93c52b103267410f0d120f01ee67f30f1af76465fdf730", {0x5}, 0x0, &(0x7f0000000240)="3647d9da8404016766410f383e3bc4627d188200000000440f38cbcf65f340e00066460f3a22677e00f2a766440fe2bbafddef49c4e1f910b72bb90000"}, &(0x7f0000000440)={&(0x7f00000002c0)="66400f765f000f4183a138000065420f9d4fd26566420ff956fbc4618014ec42d9edad8f89000133c4e3e55c7d020e3666400fdbba00000000", {}, 0x0, &(0x7f0000000400)="c48115dbfe4a0fc7a46900f80000460fd99699899999c4016d56c8420f79c80f7e16c4c179114004f20fe66100f3a5f30fc73431"}, 0x8, &(0x7f0000000480)) 22:55:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0) 22:55:07 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000025}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf64(r0, &(0x7f0000001280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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"}, 0x95d) 22:55:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) [ 774.911075][ C0] net_ratelimit: 20 callbacks suppressed [ 774.911085][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.922699][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 774.928541][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.934383][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:55:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 22:55:07 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(&(0x7f00000001c0)=0x2, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 774.991070][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 774.996933][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 775.007652][ T5084] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 22:55:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:08 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000026}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:08 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x100, 0x4) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:08 executing program 3: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 22:55:08 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x8b, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:08 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x8}) 22:55:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) [ 775.387688][ T5440] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 775.423549][ T5440] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:08 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000027}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 775.461164][ T5440] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 775.485902][ T5440] UDF-fs: Scanning with blocksize 512 failed 22:55:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:08 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x20005f) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460080000000000076"], 0xc) uselib(&(0x7f0000000000)='./file0\x00') [ 775.519569][ T5440] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 775.554933][ T5440] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:08 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000002000000802, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b000000050000009c07000014020000d4030000000000001402000014020000d0060000d0060000d0060000d0060000d006000005"], 0x1) [ 775.605998][ T5440] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 775.637914][ T5440] UDF-fs: Scanning with blocksize 1024 failed [ 775.664569][ T5440] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 775.680161][ T5440] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) [ 775.707212][ T5440] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 775.753758][ T5440] UDF-fs: Scanning with blocksize 2048 failed [ 775.776614][ T5440] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 775.801113][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 775.807017][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 775.822974][ T5440] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 775.832794][ T5440] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 775.840671][ T5440] UDF-fs: Scanning with blocksize 4096 failed [ 775.847038][ T5440] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 775.860627][ T5831] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 775.870878][ T5831] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 775.880565][ T5831] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 775.889482][ T5831] UDF-fs: Scanning with blocksize 512 failed [ 775.896682][ T5831] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 775.907237][ T5831] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 775.916987][ T5831] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 775.925720][ T5831] UDF-fs: Scanning with blocksize 1024 failed [ 775.932951][ T5831] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 775.942882][ T5831] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 775.952697][ T5831] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 775.960424][ T5831] UDF-fs: Scanning with blocksize 2048 failed [ 775.967319][ T5831] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 775.977203][ T5831] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 775.986889][ T5831] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 775.994621][ T5831] UDF-fs: Scanning with blocksize 4096 failed 22:55:08 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x600b, 0x1) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:08 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000028}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:08 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x2, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)=',', 0x1}], 0x1, 0x0) 22:55:08 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) utime(0x0, &(0x7f0000000100)) [ 776.000684][ T5831] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:09 executing program 3: syz_open_dev$usbmon(0x0, 0x0, 0x0) 22:55:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:09 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x11, r1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000000)) 22:55:09 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x3b0c022, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x7fff}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x4}}], [{@fsname={'fsname', 0x3d, 'trusted'}}]}) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:09 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000029}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040)=0xfffffffffffffff8, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100)=';', 0x1, 0x4000000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)='n', 0x1, 0x0, 0x0, 0x0) sendto$unix(r0, &(0x7f0000000040), 0xfd1b, 0x4004800, 0x0, 0x0) [ 776.351070][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 776.356955][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 776.407676][ T2488] print_req_error: 110 callbacks suppressed [ 776.407724][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 776.422861][ T2488] print_req_error: I/O error, dev loop0, sector 256 flags 0 [ 776.430599][ T6056] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:09 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00002a}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 776.470403][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 776.481820][ T6056] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 776.498007][ T6056] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 776.508140][ T6056] UDF-fs: Scanning with blocksize 512 failed 22:55:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) [ 776.530068][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 776.541892][ T2488] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 776.549668][ T6056] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:09 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x6) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:09 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) symlink(&(0x7f0000000080)='./file2\x00', &(0x7f0000000100)='./file2\x00') rename(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='./file0\x00') [ 776.596942][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 776.607366][ T6056] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:09 executing program 3: r0 = socket(0x80000000000000a, 0x10000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, 0x0, 0x0) [ 776.680929][ T6056] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 776.717813][ T6056] UDF-fs: Scanning with blocksize 1024 failed 22:55:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:09 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00002b}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 776.739860][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 776.749501][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 776.759661][ T6056] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/63, 0x3f}], 0x1, 0x2000019) [ 776.811278][ T2489] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 776.818927][ T6056] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 776.848480][ T6056] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 776.859108][ T6056] UDF-fs: Scanning with blocksize 2048 failed [ 776.868219][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 776.878342][ T6056] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 776.889417][ T6056] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 776.899898][ T6056] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 776.930800][ T6056] UDF-fs: Scanning with blocksize 4096 failed [ 776.970902][ T6056] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 777.033233][ T6783] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 777.054465][ T6783] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 777.064938][ T6783] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 777.073094][ T6783] UDF-fs: Scanning with blocksize 512 failed [ 777.086272][ T6783] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 777.097214][ T6783] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 777.107204][ T6783] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 777.114917][ T6783] UDF-fs: Scanning with blocksize 1024 failed [ 777.121788][ T6783] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 777.131664][ T6783] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 777.141341][ T6783] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 777.148979][ T6783] UDF-fs: Scanning with blocksize 2048 failed [ 777.155870][ T6783] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 777.165653][ T6783] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 777.175341][ T6783] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:10 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) r0 = eventfd(0x7) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xd5, 0xc4000) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x333d3619, 0x17cf00000000000, 0x71c6c8d3, 0x7, 0x0, 0x101, 0x20020, 0x0, 0x9, 0xa9, 0x4, 0x4ff, 0x100000000, 0x1, 0x10001, 0x80000000, 0x401, 0x5, 0x1, 0x1000, 0x80000000, 0x2, 0x80, 0x7, 0x80, 0x1, 0x2, 0x3, 0x40, 0x80000001, 0x4, 0x8001, 0x5, 0x7ff, 0x3, 0x4, 0x0, 0x9ca, 0x3, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1100, 0x6, 0x3ff, 0x0, 0x7917, 0x43, 0x1}, 0x0, 0x3, r1, 0x1) r2 = fcntl$getown(r1, 0x9) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000280)={0x7, 0x1, 0xf57}) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x200040) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000080)={0x7ff, 0x9, 0x0, 0x4, 0x0, 0xfe0}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x5, r2}) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000240)) 22:55:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:10 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:10 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00002c}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@setlink={0x44, 0x13, 0x711, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @remote}, @IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_PORT_SELF={0x4}]}, 0x44}}, 0x0) 22:55:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) [ 777.183023][ T6783] UDF-fs: Scanning with blocksize 4096 failed [ 777.189089][ T6783] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x182) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b705dfd2da7513b1504d2c6ae8754c61cadef5aa5bcd9f60a77dd69800c2882959892ef40f179a4337486468676f9d46b5c93475e790ff53842e87543fa22827", "9aaec102f8fdfd2d4b43e3083b4c7f43b7c248eff42741a60ae40d574d2076a4cce87d63fc312b71e0de729568e12c73e0b1ff29ab90845842bd2301bf195a12", "26f41b94465468d51ac3c7d3267d6134a3e12d8a7779df46f29e7dd0c2c957cc"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, "f3ae0525df595a95e8cc2b34a0cf3099adcaab1b63fcea9e8a5791bb60c5c250d0c47d76864b5d72758269858486e41eaad007fd40429593e43efd3155eebdc2", "5ca6ec0e75435b9f8114b1b2ea071046f9a64af3e73e362476507717d8911b51c0b55262566194d9b60092058c22c1bc7fa1c89eae3558f26fb6d9da456bb3f4", "6226e6f21e569903f25dfea7abdfc97e53e421e53e005cf53d44b29ffc45a353"}) 22:55:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:10 executing program 0: mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='udf\x00\xcd[\xa3\x98\x14\xad\"\x04H|\xe2\xfb\xbd\a*\xe2B\xb9*\xa2\xcc\xf7\xd9\xdbs\x86 \xf3\x02\x80)\x0em\x90\xf9~cY\x9aP\x15\t5\xc8jRH\xda\x11: \x11\x8f\xbd\xa7W9\xa3\xa8Q\x8cM=\x05\xda8\x97\x85|(sk\xe8l\x99(\x81T\r3\xb7\xab\xd5\xf4\x02\xac\xf2u\xdcE\xc6yb\xbe7\x12V\b\x00\xc6:*m\xce\xc1\xe3\xb6\x0e\xd5I\x7f\xb5d\x9b\x16\x99\x15Y\x1a\xf4q7\x87\x94[\x17\x13\x95<\xa70\xfe`nA', 0x0, 0x0) 22:55:10 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 22:55:10 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00002d}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:10 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) msgget(0x3, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000400)={{}, {}, [{0x2, 0x2}, {0x2, 0x1}, {}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x4}], {0x10, 0x4}, {0x20, 0x2}}, 0x4c, 0x3) 22:55:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, 0x0) 22:55:10 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:10 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00002e}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:10 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x3c, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f000000afd0)=ANY=[]], 0x0, 0x10000000, 0x0}) 22:55:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) [ 777.802853][ T7219] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 777.835080][ T7219] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:10 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, 0x0) [ 777.864544][ T7219] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 777.909265][ T7219] UDF-fs: Scanning with blocksize 512 failed [ 777.944997][ T7219] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:10 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00002f}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:10 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) r0 = inotify_init() ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000680)) [ 778.002581][ T7219] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.065177][ T7219] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 778.080090][ T7219] UDF-fs: Scanning with blocksize 1024 failed [ 778.087604][ T7219] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 778.125806][ T7219] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.141154][ T7219] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 778.149239][ T7219] UDF-fs: Scanning with blocksize 2048 failed [ 778.159184][ T7219] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 778.173176][ T7219] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.183276][ T7219] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 778.191041][ T7219] UDF-fs: Scanning with blocksize 4096 failed [ 778.197126][ T7219] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 778.210667][ T7541] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 778.221519][ T7541] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.231203][ T7541] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 778.238847][ T7541] UDF-fs: Scanning with blocksize 512 failed [ 778.245694][ T7541] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 778.256160][ T7541] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.265804][ T7541] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 778.273520][ T7541] UDF-fs: Scanning with blocksize 1024 failed [ 778.280098][ T7541] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 778.290614][ T7541] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.300283][ T7541] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 778.308014][ T7541] UDF-fs: Scanning with blocksize 2048 failed [ 778.314760][ T7541] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:11 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2fd7069666696c"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:11 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, 0x0) 22:55:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x2, 0x2, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:11 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) 22:55:11 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000030}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 778.324672][ T7541] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.334380][ T7541] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 778.342109][ T7541] UDF-fs: Scanning with blocksize 4096 failed [ 778.348184][ T7541] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:11 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x0, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:11 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000031}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:11 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x802, 0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0xc717, 0x3dc1, 0x5}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="650000f8316e1f4149ada77263c53a886d1a718281332c0bb0047967db5e5376e1af2ff4ced934b162ccb4a764eab0e83b6a0775bb4b3acebc685a0fad09073fc1d6fa019d023fe6e92f82286bf84d4920732aca40f8d46883442bf9478e126fd143d7a33a1ec11119"], &(0x7f0000000240)=0x6d) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:11 executing program 3: pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) close(r0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) request_key(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 22:55:11 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, &(0x7f00000003c0)=')loeth1user*md5summd5sum\x00', 0x19, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x0, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) [ 778.739887][ T7885] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 778.778744][ T7885] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.810174][ T7885] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 778.850842][ T7885] UDF-fs: Scanning with blocksize 512 failed [ 778.866971][ T7885] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 778.879885][ T7885] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 778.890506][ T7885] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:11 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 778.899434][ T7885] UDF-fs: Scanning with blocksize 1024 failed 22:55:11 executing program 3: 22:55:11 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000032}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 778.937378][ T7885] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) [ 778.978203][ T7885] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 779.021205][ T7885] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 779.051154][ T7885] UDF-fs: Scanning with blocksize 2048 failed 22:55:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x0, 0x1004000000000, [0x40000004], [0xc1]}) 22:55:11 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000600)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:11 executing program 3: [ 779.102505][ T7885] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 779.160769][ T7885] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 779.205186][ T7885] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 779.232055][ T7885] UDF-fs: Scanning with blocksize 4096 failed [ 779.251676][ T7885] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 779.296846][ T8321] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 779.306763][ T8321] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 779.317671][ T8321] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 779.325411][ T8321] UDF-fs: Scanning with blocksize 512 failed [ 779.332291][ T8321] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 779.342682][ T8321] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 779.352352][ T8321] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 779.359983][ T8321] UDF-fs: Scanning with blocksize 1024 failed [ 779.366739][ T8321] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 779.376551][ T8321] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 779.386206][ T8321] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:12 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='\xf8?H\x7fc!\x00R\x92\x83\xba\n\xd5\x81+\x81\xd4\xa3M\xc1\x9b\x12\x9b\xbf\xad\xb6\xfb\t \x8dj\xe4\xcd|\xa1*\xb1\xf7\xf5\xd8|.KfVD\x00}\v\x0ep\xb5\xc5Ow\x06\xe11n\xd9\xd86\xe72MO\x00\x10\x1a\xdc\xe9\x1a(x\x8e_+\x98PSG-N\xf0\x15z\x96\xf0N\xb3\x8f;\x17\x18\xe3\xa8\xbe\x06\xd6Zx\x8e\xfa%Ybe\xb0\xbca\x14\xf7Mp\xe5\xcc\x0e\xb3\x9c\x13\xa2\xd274%\fP\x81\x9c\x97\xdc=\xf1\x8c\x17\xe8', 0x0, 0x0) 22:55:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 22:55:12 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000180)={0xbb, @local, 0x4e22, 0x3, 'wlc\x00', 0x19, 0x1, 0x1f}, 0x2c) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:12 executing program 3: 22:55:12 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000033}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [], [0xc1]}) [ 779.393889][ T8321] UDF-fs: Scanning with blocksize 2048 failed [ 779.400478][ T8321] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 779.410375][ T8321] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 779.420017][ T8321] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 779.427722][ T8321] UDF-fs: Scanning with blocksize 4096 failed [ 779.433890][ T8321] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 22:55:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [], [0xc1]}) 22:55:12 executing program 3: 22:55:12 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:12 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000034}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:12 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 22:55:12 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="0100010000000000"], &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='udf\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xd9f, 0x800) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000180)={0x0, 0x0, {0x4, 0xffff, 0x1009, 0x5, 0x5, 0x7, 0x2, 0x7}}) 22:55:12 executing program 3: 22:55:12 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) umount2(0x0, 0x4) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x1004000000000, [], [0xc1]}) 22:55:12 executing program 3: 22:55:12 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 22:55:12 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000035}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 779.951069][ C0] net_ratelimit: 22 callbacks suppressed [ 779.951077][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 779.962660][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:55:12 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000280)={0x8, 0x6, 0x0, {0x77359400}, 0x100000000, 0x3}) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x10000) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x24000) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000180)={0x5444, 0x200, 0x4, {0x7, @pix={0x9, 0x1, 0x32314d59, 0x7, 0x101, 0x1, 0x4, 0x60, 0x1, 0x0, 0x1, 0x7}}}) 22:55:12 executing program 5: 22:55:12 executing program 3: 22:55:12 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) umount2(0x0, 0x0) sysfs$2(0x2, 0xffff, &(0x7f0000000040)=""/23) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:13 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:13 executing program 5: 22:55:13 executing program 3: 22:55:13 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000036}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:13 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) umount2(0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000040)=""/23) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) [ 780.226670][ T8642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:13 executing program 5: [ 780.268450][ T8642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 780.306856][ T8642] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:13 executing program 3: [ 780.347801][ T8642] UDF-fs: Scanning with blocksize 512 failed [ 780.363452][ T8642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 780.383132][ T8642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 780.428004][ T8642] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 780.451913][ T8642] UDF-fs: Scanning with blocksize 1024 failed [ 780.462906][ T8642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 780.480714][ T8642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 780.511129][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 780.516956][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 780.522868][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 780.523951][ T8642] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 780.528688][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 780.537585][ T8642] UDF-fs: Scanning with blocksize 2048 failed [ 780.551988][ T8642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 780.562012][ T8642] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 780.572045][ T8642] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 780.579744][ T8642] UDF-fs: Scanning with blocksize 4096 failed [ 780.586037][ T8642] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 780.598857][ T8676] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 780.608866][ T8676] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 780.618488][ T8676] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 780.626275][ T8676] UDF-fs: Scanning with blocksize 512 failed [ 780.633199][ T8676] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 780.643117][ T8676] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 780.652891][ T8676] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 780.660534][ T8676] UDF-fs: Scanning with blocksize 1024 failed [ 780.667427][ T8676] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 780.677300][ T8676] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 780.686999][ T8676] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 780.694699][ T8676] UDF-fs: Scanning with blocksize 2048 failed [ 780.701466][ T8676] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 780.716839][ T8676] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:13 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x14000, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000000c0)=0x176000, 0x4) 22:55:13 executing program 5: 22:55:13 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000600)) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) umount2(0x0, 0x0) sysfs$2(0x2, 0x0, 0x0) writev(r1, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:13 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000037}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:13 executing program 3: [ 780.726604][ T8676] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 780.734306][ T8676] UDF-fs: Scanning with blocksize 4096 failed [ 780.740398][ T8676] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:13 executing program 5: 22:55:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:13 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000600)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) umount2(0x0, 0x0) sysfs$2(0x2, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000640)="84af6d9e522f4d1f1490bed0332f02168afb26c1f6eda2fd5556bf7f7a45", 0x1e}], 0x1) 22:55:13 executing program 3: [ 780.926696][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:13 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000038}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:13 executing program 5: [ 780.984733][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 781.047725][ T8823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 781.056266][ T8823] UDF-fs: Scanning with blocksize 512 failed [ 781.069210][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 781.126297][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 781.141594][ T8823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 781.151088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 781.156947][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 781.157370][ T8823] UDF-fs: Scanning with blocksize 1024 failed [ 781.162830][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 781.174666][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 781.175285][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 781.190654][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 781.200464][ T8823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 781.208202][ T8823] UDF-fs: Scanning with blocksize 2048 failed [ 781.214817][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 781.224715][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 781.234478][ T8823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 781.242198][ T8823] UDF-fs: Scanning with blocksize 4096 failed [ 781.248274][ T8823] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 781.261242][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 781.271246][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 781.280895][ T8823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 781.288717][ T8823] UDF-fs: Scanning with blocksize 512 failed [ 781.295756][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 781.305692][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 781.315294][ T8823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 781.323048][ T8823] UDF-fs: Scanning with blocksize 1024 failed [ 781.329905][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 781.339760][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 781.349427][ T8823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 781.357174][ T8823] UDF-fs: Scanning with blocksize 2048 failed [ 781.363841][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:14 executing program 3: 22:55:14 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000600)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) umount2(0x0, 0x0) sysfs$2(0x2, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 22:55:14 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@remote, @initdev, @remote, 0x0, 0x80}) 22:55:14 executing program 0: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="d6ef57d5b0e89a88bc0c7859af8ccc15585caa0100f180ace1be76b342b6c260c8128b060760cd81f79eb045fcdced1cdb6797ff9fd4202a0b16aacd929498f1c3d6a60f9f5b6c1611e765609df76a027a7d90bb72af9e3fcc937cb8a8d402a74182f450208ac6d935fcdc4fb739855c17ac15e268ff8c2823898b7183", 0x7d, 0x8}, {&(0x7f0000000200)="1c841f9d405185f1bb542b191dd56cfecc442d87e90eb18dff3ec3e903ce8d0085d6f16617ffe316df0fff548307941c3a2a393870aea6d2", 0x38, 0x2477}], 0x10, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:14 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000039}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 781.373722][ T8823] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 781.384024][ T8823] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 781.392961][ T8823] UDF-fs: Scanning with blocksize 4096 failed [ 781.399118][ T8823] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 22:55:14 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) ioprio_set$uid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 22:55:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1002}, {&(0x7f0000000240)=""/147, 0x6a6}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x2, &(0x7f0000002e40)={0x77359400}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) 22:55:14 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40004) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e67, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, 0x0, 0x0, 0x10000, &(0x7f0000002240)) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f00000022c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000023c0)={&(0x7f0000002280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002380)={&(0x7f0000002300)={0x2c, r0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x2b0}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x400) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100), 0x14) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000380)) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x10001) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 22:55:14 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00003a}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 781.614729][ T9088] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 22:55:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) [ 781.702299][ T9088] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 22:55:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = memfd_create(&(0x7f00000001c0)='+\x8b\x8a\x16\x11O\xdd\xdfD\x85\x1d\b\v(9\xd3\xa7\x9b\x8d\xb7a\x03&k-F\x89\x94a\xac\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r3, &(0x7f0000000000), 0x5) fcntl$addseals(r3, 0x409, 0x8) fsetxattr$system_posix_acl(r3, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {}, [{}]}, 0x2c, 0x0) dup3(r2, r3, 0x0) 22:55:14 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r2, 0x0, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40844}, 0x4010) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:14 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', @ifru_names='\x000q\x00'}) 22:55:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:14 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00003b}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 782.082152][ T2489] print_req_error: 110 callbacks suppressed [ 782.082165][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 782.096506][ T2489] print_req_error: I/O error, dev loop0, sector 256 flags 0 [ 782.104073][ T9463] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x35c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080), 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 782.148254][ T2489] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 782.156157][ T9463] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) [ 782.201887][ T9463] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 782.247518][ T9463] UDF-fs: Scanning with blocksize 512 failed [ 782.279440][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 22:55:15 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00003c}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 782.296091][ T2489] print_req_error: I/O error, dev loop0, sector 512 flags 0 [ 782.305779][ T9463] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) [ 782.360563][ T2489] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 782.369527][ T9463] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 782.391077][ T9463] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 782.424932][ T9463] UDF-fs: Scanning with blocksize 1024 failed [ 782.457154][ T2489] print_req_error: I/O error, dev loop0, sector 64 flags 0 22:55:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:15 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40004) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e67, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, 0x0, 0x0, 0x10000, &(0x7f0000002240)) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f00000022c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000023c0)={&(0x7f0000002280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002380)={&(0x7f0000002300)={0x2c, r0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x2b0}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x400) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100), 0x14) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000380)) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x10001) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 782.471426][ T2488] print_req_error: I/O error, dev loop0, sector 1024 flags 0 [ 782.479093][ T9463] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 782.494726][ T2488] print_req_error: I/O error, dev loop0, sector 2048 flags 0 [ 782.504559][ T9463] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:15 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x186) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={&(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x2e, &(0x7f0000000080), 0x0, &(0x7f0000001280)=""/243, 0xf3}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x2, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x600000, 0x0, 0x6e, 0x0, 0x7, 0x0, 0xae54, 0x0, 0x8, 0x0, 0x40000, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0x20000000d, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0xffffffffffffff95, 0x6, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuse4.effectiv\x03~I!\xbe\x13e_mems\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xfffffffffffffffe) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x04\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x11b, 0x2, &(0x7f0000000200), 0xd14cc5addfad2f5d) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$kcm(0x10, 0x1000000000000002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000640)={'nr0\x00', 0x20}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x5, 0x1, &(0x7f0000000500)={0xffffffffffffffff}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r1, 0x5, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') socketpair(0xd02b350a24c6db59, 0x4004, 0x10000, &(0x7f0000000400)) close(r7) [ 782.518175][ T9463] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 782.527205][ T9463] UDF-fs: Scanning with blocksize 2048 failed [ 782.537084][ T2488] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 782.546551][ T9463] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 782.558199][ T9463] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r0, &(0x7f00000009c0)=ANY=[@ANYRESDEC], 0x14) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'cpu'}]}, 0x5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x5000000) [ 782.608938][ T9463] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 782.640288][ T9463] UDF-fs: Scanning with blocksize 4096 failed [ 782.662889][ T9463] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 782.708392][T10088] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 782.795116][ T26] audit: type=1804 audit(1553554515.647:382): pid=10113 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir102020000/syzkaller.f1vDIJ/807/memory.events" dev="sda1" ino=18004 res=1 [ 782.820765][T10088] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 782.832567][T10088] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 782.851724][T10088] UDF-fs: Scanning with blocksize 512 failed [ 782.862286][T10088] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 782.873736][T10088] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 782.884243][T10088] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 782.894084][T10088] UDF-fs: Scanning with blocksize 1024 failed [ 782.904576][T10088] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 782.916487][T10088] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 782.927143][T10088] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 782.936483][T10088] UDF-fs: Scanning with blocksize 2048 failed [ 782.970003][T10088] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 783.014386][T10088] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.065533][T10088] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.096109][T10088] UDF-fs: Scanning with blocksize 4096 failed [ 783.104789][T10088] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:16 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6009, 0x0) io_setup(0x1, &(0x7f0000000040)) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:16 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00003d}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:16 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file0/bus\x00', 0x0) unshare(0x40600) fchmod(r0, 0x0) 22:55:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4, 0x70}, 0x2c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3805}) close(r1) 22:55:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 22:55:16 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00003e}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 783.407184][T10618] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:16 executing program 1: [ 783.474266][T10618] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.524982][T10618] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.544024][T10618] UDF-fs: Scanning with blocksize 512 failed 22:55:16 executing program 5: 22:55:16 executing program 3: 22:55:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) [ 783.585628][T10618] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 783.596548][T10618] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.629527][T10618] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.653562][T10618] UDF-fs: Scanning with blocksize 1024 failed [ 783.676939][T10618] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 783.732921][T10618] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.747276][T10618] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.756085][T10618] UDF-fs: Scanning with blocksize 2048 failed [ 783.763416][T10618] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 783.773567][T10618] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.783231][T10618] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.790862][T10618] UDF-fs: Scanning with blocksize 4096 failed [ 783.797281][T10618] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 783.809777][T10822] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 783.819720][T10822] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.829468][T10822] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.837173][T10822] UDF-fs: Scanning with blocksize 512 failed [ 783.843968][T10822] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 783.854529][T10822] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.864203][T10822] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.871933][T10822] UDF-fs: Scanning with blocksize 1024 failed [ 783.878563][T10822] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 783.889489][T10822] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.899714][T10822] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.907492][T10822] UDF-fs: Scanning with blocksize 2048 failed [ 783.914243][T10822] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 783.924172][T10822] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 783.933800][T10822] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 783.941532][T10822] UDF-fs: Scanning with blocksize 4096 failed [ 783.947615][T10822] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:16 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 22:55:16 executing program 1: 22:55:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) 22:55:16 executing program 5: 22:55:16 executing program 3: 22:55:16 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000041}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:17 executing program 1: 22:55:17 executing program 5: 22:55:17 executing program 3: 22:55:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) [ 784.224364][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:17 executing program 1: 22:55:17 executing program 5: [ 784.276937][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 784.323501][T10881] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 784.350782][T10881] UDF-fs: Scanning with blocksize 512 failed [ 784.367537][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 784.391402][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 784.401261][T10881] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 784.409016][T10881] UDF-fs: Scanning with blocksize 1024 failed [ 784.416029][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 784.425886][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 784.435543][T10881] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 784.443298][T10881] UDF-fs: Scanning with blocksize 2048 failed [ 784.449866][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 784.459701][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 784.469410][T10881] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 784.477109][T10881] UDF-fs: Scanning with blocksize 4096 failed [ 784.483240][T10881] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 784.494974][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 784.504921][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 784.514742][T10881] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 784.522502][T10881] UDF-fs: Scanning with blocksize 512 failed [ 784.529099][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 784.539081][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 784.548725][T10881] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 784.556471][T10881] UDF-fs: Scanning with blocksize 1024 failed [ 784.563067][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 784.572953][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 784.582626][T10881] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 784.590261][T10881] UDF-fs: Scanning with blocksize 2048 failed [ 784.597076][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 784.606907][T10881] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 784.616592][T10881] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:17 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="bca26f94bc"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/141) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2b4901, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000000c0)={0x0, 0x0, 0x7, 0x14, &(0x7f0000ffb000/0x3000)=nil, 0x7fffffff}) 22:55:17 executing program 3: 22:55:17 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000042}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:17 executing program 5: unshare(0x2000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 22:55:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) fadvise64(r0, 0x0, 0x0, 0x0) [ 784.624303][T10881] UDF-fs: Scanning with blocksize 4096 failed [ 784.630409][T10881] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:17 executing program 3: 22:55:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:17 executing program 1: 22:55:17 executing program 3: 22:55:17 executing program 5: 22:55:17 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000300}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:17 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2e2f66886c653000cfa6b881455cbffd765200462e0a4655dd212ebfa3a6a403ff19991eee4dc60954a57765a75ccdf484bf193be1f31eb0065a3d80ef21a18346dcdeaaebc8d48c94c8981b004d8a"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x11828, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'vmnet0['}}, {@cache_loose='cache=loose'}, {@posixacl='posixacl'}, {@loose='loose'}, {@msize={'msize', 0x3d, 0x7f}}, {@nodevmap='nodevmap'}, {@noextend='noextend'}, {@noextend='noextend'}, {@loose='loose'}], [{@measure='measure'}]}}) 22:55:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:17 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='ceph\x00', 0x0, 0x0) 22:55:17 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x0, 0xd}) 22:55:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]}, 0x2e0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, 0x0, 0x0) 22:55:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 22:55:17 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 22:55:17 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x18400, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)=0x0) r2 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x8, 0x400100) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) sendmsg$nl_generic(r0, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000340)={0x2d8, 0x2a, 0x20c, 0x70bd2d, 0x25dfdbff, {0x12}, [@generic="a282da2927e593c5a5c33c8d3ab55b91be7f273aa49132b882b5fd075cfe0e4440cd1caf06fcc718156f9964c3539386310ffa9f43c70326c62ff3c87b1ff86e4293b19a27b5c3c8a4da43efc897de9eafa5219c0650f358db0cd853f213e5988a1b05cd921d07d19490aedc36e6b404609dc690ca93969f15c518c91afceb02a89a1ff49bc5f564d02daf91a4bc057352a04fe8c56bba21ac7aea9f9014b6024a4a897ac35a93e2c75e39a4d9af169d44e2feef91e9be4fee0612c62d921904be21ce828c826f40c4bffd44d941dd36fb77", @typed={0x4, 0x72}, @typed={0x14, 0x29, @ipv6=@mcast1}, @nested={0x20, 0x93, [@typed={0x8, 0x3f, @ipv4=@multicast2}, @typed={0x14, 0x7, @ipv6=@remote}]}, @nested={0x58, 0x16, [@typed={0x4c, 0x1, @binary="04f095fd252deceb6e1bf92911d102c2958ea9a5ee5d03aadf0f8ca437e3a51d15bdebddc9a0e1a77443d847b8ab053cb5adfd5bd88cfb9519a646c379153a9c3afc3d59dffb"}, @typed={0x8, 0x59, @pid=r1}]}, @generic="d0f371478f95b97216f24b5b12afebcb5c6fd3e6c3b826f38d816456572911fa3f40f05abf052a63e4f9b659de478d2c8c9b959b249946010c9cc0c8fc4fde55ad817410acaf04f93c78b498e196eaf35cac66053019a2a10592e7beadcb4873efd8023473cec8bb8db595a2e12c047ce8813afa9184b64599792c8a5e6a905c1dd2bd26047215ab950485fcbf058b31028dd4d1af7c47d5e795cdb4c1c66866ad54bcf59c27d869fdd2db9fccd840c025e0c70c48b0b7136b29ac34d67ebdfde123b84fb0", @nested={0x24, 0x4c, [@typed={0x8, 0x32, @fd=r2}, @generic="0673304ebaaa68bc2920eca0face61dfc07ae619b1cb"]}, @nested={0x64, 0x44, [@generic="c7c2a14be60910c18ef69691818b2c62e4bfd5037f528e7ecd860780291954b1571fd249096981d4a1f5e7baee2b89d3f948a7df6bca3c40b7372bea3a5ae8a8981bef63c4ed389d7ade3ecd0bcbd0086275187c9ef8bc4a2d95fbad38"]}, @nested={0xc, 0xa, [@typed={0x8, 0x3, @str='*W\x00'}]}, @typed={0x8, 0x7e, @fd=r3}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x4000}, 0x800) 22:55:18 executing program 5: r0 = semget$private(0x0, 0x8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) semop(r0, &(0x7f0000000100), 0xba) 22:55:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) 22:55:18 executing program 1: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) [ 785.259276][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 785.311062][ C0] net_ratelimit: 20 callbacks suppressed [ 785.311071][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.322663][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.328452][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 785.328492][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.343973][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.344349][T11263] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:18 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000301}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:18 executing program 3: r0 = getpgrp(0x0) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) [ 785.365593][T11263] UDF-fs: Scanning with blocksize 512 failed [ 785.391081][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 785.396992][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:55:18 executing program 1: r0 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000440)=""/63, 0x3f) [ 785.419058][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 785.444985][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:18 executing program 1: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) [ 785.490079][T11263] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 785.515756][T11263] UDF-fs: Scanning with blocksize 1024 failed 22:55:18 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000001140)=""/4096) 22:55:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) [ 785.545684][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 785.579852][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 22:55:18 executing program 1: r0 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x160, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x1d8) [ 785.621233][T11263] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 785.635835][T11263] UDF-fs: Scanning with blocksize 2048 failed [ 785.649199][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:18 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000501}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 785.670495][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 785.691400][T11263] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 785.708048][T11263] UDF-fs: Scanning with blocksize 4096 failed [ 785.717557][T11263] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 785.744019][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 785.769253][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 785.779236][T11263] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 785.787324][T11263] UDF-fs: Scanning with blocksize 512 failed [ 785.795495][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 785.805503][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 785.815261][T11263] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 785.823092][T11263] UDF-fs: Scanning with blocksize 1024 failed [ 785.829991][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 785.839971][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 785.849704][T11263] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 785.857625][T11263] UDF-fs: Scanning with blocksize 2048 failed [ 785.864486][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 785.874612][T11263] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 785.884294][T11263] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 22:55:18 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2fe383288266696c653000"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x800, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000180)) [ 785.892828][T11263] UDF-fs: Scanning with blocksize 4096 failed [ 785.898962][T11263] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) 22:55:18 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x301000, 0x0) fcntl$getown(r0, 0x9) 22:55:18 executing program 3: tkill(0x0, 0x0) 22:55:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) 22:55:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x22000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x1e8) 22:55:18 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f00ff04}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:18 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) r2 = geteuid() syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="7c77c32bd537798c4336d717b089e41a6762b0af454db73083f4eb68e2b2f5b8b27d8e0bc973bdf10754e223a3ede5f3b434b75f7f2c0f97b1e4fe162b1a1161e3d80ecba20ee6bbee3bbaa571af2999c2077365f33227547279b7d5b6c18cc1b275a585d547232a58fc0d260ef06608432cc8d478c9f7a4c10a2142f445548a8d104e354ca0ed62e26b980c944aaac262495a6da0ea5940e437fc3f657204e821", 0xa1, 0x3}], 0x2010000, &(0x7f0000000500)={[{@nomblk_io_submit='nomblk_io_submit'}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}], [{@uid_lt={'uid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x77, 0x33, 0x37, 0x63, 0x34, 0x36, 0x7b], 0x2d, [0x33, 0x76, 0x64, 0x77], 0x2d, [0x7f, 0x34, 0x65, 0x34], 0x2d, [0x71, 0x8f9a11d4a912d2b5, 0x0, 0x77], 0x2d, [0x77, 0x3f, 0x38, 0x72, 0x30, 0x7e, 0x64, 0x7a]}}}, {@uid_eq={'uid', 0x3d, r1}}, {@uid_gt={'uid>', r2}}, {@subj_type={'subj_type', 0x3d, 'udf\x00'}}, {@context={'context', 0x3d, 'root'}}, {@permit_directio='permit_directio'}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}) [ 786.191103][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 786.196964][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 786.204895][T11948] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 22:55:19 executing program 3: socket$pppoe(0x18, 0x1, 0x0) 22:55:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0xbb7f, 0x5a6b010000000000, 0xfffffffffffffffe}, 0xc, &(0x7f0000000440)={&(0x7f0000000080)={0x14, 0x22, 0x1}, 0x14}}, 0x0) 22:55:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x22b, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x21d, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) [ 786.238466][T11948] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 786.258183][T11944] xt_connbytes: cannot load conntrack support for proto=7 [ 786.274778][T11944] xt_connbytes: Forcing CT accounting to be enabled 22:55:19 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000002c0)={0x0, 0x100000001, 0x1, {0x1, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) ioctl$VIDIOC_STREAMON(r0, 0xc0405610, &(0x7f0000000000)=0x1) 22:55:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x22b, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x21d, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96"}}}}}, 0x0) 22:55:19 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0xac14140a}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 22:55:19 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40801, 0x0) read$rfkill(r0, 0x0, 0x0) 22:55:19 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x2) 22:55:19 executing program 3: semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000200)=""/4096) 22:55:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, &(0x7f0000000100)) 22:55:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') [ 786.751094][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 786.757824][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 790.351129][ C0] net_ratelimit: 20 callbacks suppressed [ 790.351137][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.362660][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.911107][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 790.916938][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 790.922853][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 790.928616][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 791.551106][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 791.556945][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 791.562848][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 791.568644][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 795.711089][ C0] net_ratelimit: 20 callbacks suppressed [ 795.711098][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.722736][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 795.728536][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.734380][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 795.791095][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 795.796938][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 796.591112][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.597124][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 797.151120][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 797.156969][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 800.751098][ C0] net_ratelimit: 20 callbacks suppressed [ 800.751108][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 800.763243][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 801.311108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 801.316944][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 801.322880][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 801.328636][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 801.951088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 801.956898][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 801.962792][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 801.968542][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 806.111082][ C0] net_ratelimit: 20 callbacks suppressed [ 806.111092][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 806.122561][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 806.128348][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 806.134165][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 806.191078][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 806.196987][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 806.991105][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 806.996904][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 807.551071][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 807.556924][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 811.151097][ C0] net_ratelimit: 20 callbacks suppressed [ 811.151106][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 811.162589][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 811.711065][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 811.716913][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 811.722776][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 811.728534][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 812.351086][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 812.356885][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 812.362761][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 812.368514][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.511140][ C0] net_ratelimit: 20 callbacks suppressed [ 816.511149][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.522629][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.528461][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.534254][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.591108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 816.596908][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 817.391129][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 817.396970][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 817.951074][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 817.956920][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 821.551086][ C0] net_ratelimit: 20 callbacks suppressed [ 821.551096][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 821.562590][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 822.111080][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 822.116903][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 822.122769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 822.128515][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 822.761088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 822.766906][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 822.772768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 822.778513][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 826.911089][ C0] net_ratelimit: 20 callbacks suppressed [ 826.911099][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 826.922598][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 826.928432][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 826.934217][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 826.991079][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 826.996905][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 827.791126][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 827.796982][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 828.351089][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 828.356883][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 831.951158][ C0] net_ratelimit: 20 callbacks suppressed [ 831.951168][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 831.962666][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 832.511066][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 832.516884][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 832.522750][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 832.528502][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 833.161092][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 833.166915][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 833.172795][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 833.178557][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 837.311109][ C0] net_ratelimit: 20 callbacks suppressed [ 837.316837][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 837.322640][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 837.328514][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 837.334301][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 837.391074][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 837.396891][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 838.191130][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 838.196927][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 838.751085][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 838.756932][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 842.351107][ C0] net_ratelimit: 20 callbacks suppressed [ 842.351117][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 842.362667][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 842.911090][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 842.916996][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 842.922848][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 842.928625][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 843.551105][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 843.556929][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 843.562800][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 843.568567][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 847.711110][ C0] net_ratelimit: 20 callbacks suppressed [ 847.716850][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 847.722660][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 847.728546][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 847.734349][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 847.791068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 847.796919][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 848.591161][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 848.596993][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 849.151136][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 849.156968][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 852.751141][ C0] net_ratelimit: 20 callbacks suppressed [ 852.751150][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 852.764510][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 853.311127][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 853.316953][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 853.322914][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 853.328933][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 853.951117][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 853.957202][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 853.963942][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 853.969899][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 858.111105][ C0] net_ratelimit: 20 callbacks suppressed [ 858.111115][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 858.122813][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 858.128654][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 858.134474][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 858.191095][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 858.196994][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 858.991130][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 858.996956][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 859.551086][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 859.556950][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 863.151095][ C0] net_ratelimit: 20 callbacks suppressed [ 863.151104][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 863.162761][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 863.711097][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 863.716903][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 863.722800][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 863.728579][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 864.361079][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 864.366892][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 864.372746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 864.378501][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 868.511147][ C0] net_ratelimit: 20 callbacks suppressed [ 868.511156][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 868.522685][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 868.528481][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 868.534284][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 868.591094][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 868.596905][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 869.391102][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 869.396938][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 869.951102][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 869.956953][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 873.551111][ C0] net_ratelimit: 20 callbacks suppressed [ 873.551120][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 873.562588][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 874.111078][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 874.116903][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 874.122787][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 874.128530][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 874.751083][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 874.757385][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 874.763273][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 874.769035][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 878.911079][ C0] net_ratelimit: 20 callbacks suppressed [ 878.911088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 878.922686][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 878.928506][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 878.934290][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 878.991054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 878.996817][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 879.791089][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 879.796898][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 880.351082][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 880.356890][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 883.951083][ C0] net_ratelimit: 20 callbacks suppressed [ 883.951093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 883.962614][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 884.511079][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 884.516907][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 884.522780][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 884.528535][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 885.161069][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 885.166900][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 885.172753][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 885.178492][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 889.321076][ C0] net_ratelimit: 20 callbacks suppressed [ 889.321086][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 889.332575][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 889.338345][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 889.344150][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 889.391064][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 889.396868][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 890.191253][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 890.197034][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 890.751077][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 890.756864][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 894.351138][ C0] net_ratelimit: 20 callbacks suppressed [ 894.351147][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 894.362678][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 894.911086][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 894.916920][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 894.922931][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 894.928717][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 895.551085][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 895.556862][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 895.562733][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 895.568483][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 899.721096][ C0] net_ratelimit: 20 callbacks suppressed [ 899.721105][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 899.732617][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 899.738438][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 899.744353][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 899.791095][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 899.796937][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 900.591107][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 900.596947][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 901.151108][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 901.156955][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 904.751102][ C0] net_ratelimit: 20 callbacks suppressed [ 904.751112][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 904.762702][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 905.311106][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 905.316957][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 905.322860][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 905.328627][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 905.951108][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 905.957037][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 905.962940][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 905.968725][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 910.111108][ C0] net_ratelimit: 20 callbacks suppressed [ 910.111117][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 910.122720][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 910.128559][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 910.134366][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 910.191104][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 910.196915][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 910.991149][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 910.997000][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 911.551089][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 911.556889][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 915.151106][ C0] net_ratelimit: 20 callbacks suppressed [ 915.151115][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 915.162751][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 915.711115][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 915.716950][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 915.722888][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 915.728670][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 916.351094][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 916.356944][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 916.362851][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 916.368610][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 920.511136][ C0] net_ratelimit: 20 callbacks suppressed [ 920.511146][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 920.522633][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 920.528489][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 920.534285][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 920.591054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 920.596839][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 921.391130][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 921.396955][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 921.951084][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 921.956866][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 925.551082][ C0] net_ratelimit: 20 callbacks suppressed [ 925.551091][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 925.562612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 926.111068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 926.116908][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 926.122765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 926.128528][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 926.751077][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 926.756870][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 926.762765][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 926.768525][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 930.911076][ C0] net_ratelimit: 20 callbacks suppressed [ 930.911086][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 930.922567][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 930.928335][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 930.934195][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 930.991041][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 930.996830][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 931.791124][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 931.796941][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 932.351071][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 932.356878][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 934.991259][ T1041] INFO: task syz-executor.0:11960 blocked for more than 143 seconds. [ 934.999371][ T1041] Not tainted 5.1.0-rc2 #36 [ 935.012617][ T1041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 935.026088][ T1041] syz-executor.0 D28600 11960 14095 0x00000004 [ 935.035105][ T1041] Call Trace: [ 935.038426][ T1041] __schedule+0x817/0x1cc0 [ 935.047738][ T1041] ? __sched_text_start+0x8/0x8 [ 935.055222][ T1041] ? rwsem_down_write_failed+0x764/0xc30 [ 935.060890][ T1041] ? _raw_spin_unlock_irq+0x28/0x90 [ 935.074301][ T1041] ? lockdep_hardirqs_on+0x418/0x5d0 [ 935.079630][ T1041] schedule+0x92/0x180 [ 935.088610][ T1041] rwsem_down_write_failed+0x774/0xc30 [ 935.096724][ T1041] ? rwsem_down_read_failed+0x420/0x420 [ 935.107125][ T1041] ? mark_held_locks+0xf0/0xf0 [ 935.114622][ T1041] call_rwsem_down_write_failed+0x17/0x30 [ 935.120353][ T1041] ? call_rwsem_down_write_failed+0x17/0x30 [ 935.133719][ T1041] down_write+0x53/0x90 [ 935.137898][ T1041] ? grab_super+0xb4/0x290 [ 935.146216][ T1041] grab_super+0xb4/0x290 [ 935.150475][ T1041] ? lock_acquire+0x16f/0x3f0 [ 935.159394][ T1041] ? drop_super_exclusive+0x30/0x30 [ 935.168396][ T1041] ? test_single_super+0x10/0x10 [ 935.177187][ T1041] ? test_single_super+0x10/0x10 [ 935.185844][ T1041] sget_userns+0x1ab/0x560 [ 935.190276][ T1041] ? kill_litter_super+0x60/0x60 [ 935.199014][ T1041] ? test_single_super+0x10/0x10 [ 935.209095][ T1041] ? kill_litter_super+0x60/0x60 [ 935.235541][ T1041] sget+0x10c/0x150 [ 935.239413][ T1041] mount_bdev+0xff/0x3c0 [ 935.246497][ T1041] ? udf_load_vrs+0xc80/0xc80 [ 935.255966][ T1041] udf_mount+0x35/0x40 [ 935.260052][ T1041] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 935.268107][ T1041] legacy_get_tree+0xf2/0x200 [ 935.277540][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 935.286403][ T1041] vfs_get_tree+0x123/0x450 [ 935.290925][ T1041] do_mount+0x1436/0x2c40 [ 935.300116][ T1041] ? copy_mount_string+0x40/0x40 [ 935.307627][ T1041] ? _copy_from_user+0xdd/0x150 [ 935.321335][ T1041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 935.327597][ T1041] ? copy_mount_options+0x280/0x3a0 [ 935.340018][ T1041] ksys_mount+0xdb/0x150 [ 935.344622][ T1041] __x64_sys_mount+0xbe/0x150 [ 935.349315][ T1041] do_syscall_64+0x103/0x610 [ 935.361089][ T1041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.366996][ T1041] RIP: 0033:0x458209 [ 935.370907][ T1041] Code: Bad RIP value. [ 935.382106][ T1041] RSP: 002b:00007fa54599ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 935.390529][ T1041] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458209 [ 935.405535][ T1041] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 935.416069][ T1041] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 935.428783][ T1041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa54599b6d4 [ 935.439309][ T1041] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 00000000ffffffff [ 935.454299][ T1041] [ 935.454299][ T1041] Showing all locks held in the system: [ 935.466606][ T1041] 1 lock held by khungtaskd/1041: [ 935.475485][ T1041] #0: 0000000034bf1e6b (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 935.488557][ T1041] 1 lock held by rsyslogd/7660: [ 935.497044][ T1041] #0: 00000000580db1e4 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 935.509338][ T1041] 2 locks held by getty/7772: [ 935.517639][ T1041] #0: 000000001aa0c204 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 935.530225][ T1041] #1: 00000000e8854ea7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 935.547097][ T1041] 2 locks held by getty/7773: [ 935.555360][ T1041] #0: 000000003a83bc36 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 935.571189][ T1041] #1: 000000005dc7c2d4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 935.580769][ T1041] 2 locks held by getty/7774: [ 935.592769][ T1041] #0: 00000000b9b10f0e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 935.607540][ T1041] #1: 000000008c792313 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 935.618662][ T1041] 2 locks held by getty/7775: [ 935.629123][ T1041] #0: 000000006732f540 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 935.647303][ T1041] #1: 00000000013bc75a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 935.657215][ T1041] 2 locks held by getty/7776: [ 935.668772][ T1041] #0: 00000000c23992e1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 935.678057][ T1041] #1: 00000000d54ed145 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 935.694574][ T1041] 2 locks held by getty/7777: [ 935.699254][ T1041] #0: 0000000011c208fe (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 935.710787][ T1041] #1: 00000000dcca019c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 935.728579][ T1041] 2 locks held by getty/7778: [ 935.733575][ T1041] #0: 0000000016189dfa (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 935.749529][ T1041] #1: 00000000638d83e1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 935.759490][ T1041] 1 lock held by syz-executor.0/11948: [ 935.772148][ T1041] 2 locks held by syz-executor.0/11960: [ 935.777692][ T1041] #0: 00000000b5dce052 (&bdev->bd_fsfreeze_mutex){+.+.}, at: mount_bdev+0x93/0x3c0 [ 935.794326][ T1041] #1: 000000003a5f7cbc (&type->s_umount_key#78){++++}, at: grab_super+0xb4/0x290 [ 935.807208][ T1041] [ 935.809545][ T1041] ============================================= [ 935.809545][ T1041] [ 935.824951][ T1041] NMI backtrace for cpu 1 [ 935.829293][ T1041] CPU: 1 PID: 1041 Comm: khungtaskd Not tainted 5.1.0-rc2 #36 [ 935.836742][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.846793][ T1041] Call Trace: [ 935.850136][ T1041] dump_stack+0x172/0x1f0 [ 935.854476][ T1041] nmi_cpu_backtrace.cold+0x63/0xa4 [ 935.859748][ T1041] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 935.865393][ T1041] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 935.871392][ T1041] arch_trigger_cpumask_backtrace+0x14/0x20 [ 935.877285][ T1041] watchdog+0x9b7/0xec0 [ 935.881495][ T1041] kthread+0x357/0x430 [ 935.885567][ T1041] ? reset_hung_task_detector+0x30/0x30 [ 935.891584][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 935.897827][ T1041] ret_from_fork+0x3a/0x50 [ 935.902504][ T1041] Sending NMI from CPU 1 to CPUs 0: [ 935.908454][ C0] NMI backtrace for cpu 0 [ 935.908461][ C0] CPU: 0 PID: 11948 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 [ 935.908467][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.908471][ C0] RIP: 0010:__find_get_block+0x3f/0xcf0 [ 935.908483][ C0] Code: 55 c0 48 89 7d d0 e8 b0 79 b0 ff 48 c7 c2 e8 96 92 88 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 51 0b 00 00 <48> 83 3d f1 9e d2 06 00 0f 84 c4 09 00 00 e8 7e 79 b0 ff 9c 58 0f [ 935.908487][ C0] RSP: 0018:ffff88804dd87670 EFLAGS: 00000246 [ 935.908496][ C0] RAX: dffffc0000000000 RBX: ffffea000159a600 RCX: ffffc90005e57000 [ 935.908501][ C0] RDX: 1ffffffff11252dd RSI: ffffffff81bff7d0 RDI: ffff88809f478800 [ 935.908507][ C0] RBP: ffff88804dd876d0 R08: ffff8880a7e24100 R09: fffff940002b34d7 [ 935.908512][ C0] R10: fffff940002b34d6 R11: ffffea000159a6b7 R12: 0000000000000001 [ 935.908517][ C0] R13: 0000000000000001 R14: ffffea000159a680 R15: 0000000000000003 [ 935.908523][ C0] FS: 00007fa5459bc700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 935.908528][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 935.908533][ C0] CR2: ffffffffff600400 CR3: 0000000059212000 CR4: 00000000001426f0 [ 935.908539][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 935.908544][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 935.908547][ C0] Call Trace: [ 935.908551][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 935.908555][ C0] ? init_page_buffers+0x37c/0x470 [ 935.908559][ C0] __getblk_gfp+0x1b1/0x960 [ 935.908562][ C0] __bread_gfp+0x2f/0x300 [ 935.908565][ C0] udf_tread+0xf1/0x140 [ 935.908569][ C0] udf_read_tagged+0x50/0x530 [ 935.908573][ C0] udf_check_anchor_block+0x1ef/0x680 [ 935.908577][ C0] ? blkpg_ioctl+0xa90/0xa90 [ 935.908581][ C0] ? udf_process_sequence+0x35d0/0x35d0 [ 935.908585][ C0] ? should_fail_bio.isra.0+0x10/0xa0 [ 935.908589][ C0] udf_scan_anchors+0x3f4/0x680 [ 935.908593][ C0] ? udf_check_anchor_block+0x680/0x680 [ 935.908598][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 935.908602][ C0] ? udf_get_last_session+0x120/0x120 [ 935.908605][ C0] udf_load_vrs+0x8bf/0xc80 [ 935.908609][ C0] ? udf_scan_anchors+0x680/0x680 [ 935.908613][ C0] ? udf_bread+0x260/0x260 [ 935.908617][ C0] ? lockdep_init_map+0x1be/0x6d0 [ 935.908620][ C0] udf_fill_super+0x7d8/0x16d1 [ 935.908624][ C0] ? udf_load_vrs+0xc80/0xc80 [ 935.908628][ C0] ? vsprintf+0x40/0x40 [ 935.908631][ C0] ? set_blocksize+0x2bf/0x340 [ 935.908636][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 935.908639][ C0] mount_bdev+0x307/0x3c0 [ 935.908643][ C0] ? udf_load_vrs+0xc80/0xc80 [ 935.908646][ C0] udf_mount+0x35/0x40 [ 935.908650][ C0] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 935.908654][ C0] legacy_get_tree+0xf2/0x200 [ 935.908659][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 935.908662][ C0] vfs_get_tree+0x123/0x450 [ 935.908666][ C0] do_mount+0x1436/0x2c40 [ 935.908669][ C0] ? copy_mount_string+0x40/0x40 [ 935.908673][ C0] ? _copy_from_user+0xdd/0x150 [ 935.908677][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 935.908681][ C0] ? copy_mount_options+0x280/0x3a0 [ 935.908685][ C0] ksys_mount+0xdb/0x150 [ 935.908688][ C0] __x64_sys_mount+0xbe/0x150 [ 935.908692][ C0] do_syscall_64+0x103/0x610 [ 935.908696][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.908700][ C0] RIP: 0033:0x458209 [ 935.908711][ C0] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 935.908716][ C0] RSP: 002b:00007fa5459bbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 935.908726][ C0] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458209 [ 935.908731][ C0] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000020000000 [ 935.908737][ C0] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 935.908743][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5459bc6d4 [ 935.908748][ C0] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 00000000ffffffff [ 935.916368][ T1041] Kernel panic - not syncing: hung_task: blocked tasks [ 935.951101][ C0] net_ratelimit: 20 callbacks suppressed [ 935.951109][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 935.956146][ T1041] CPU: 1 PID: 1041 Comm: khungtaskd Not tainted 5.1.0-rc2 #36 [ 935.962293][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 935.970152][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.970162][ T1041] Call Trace: [ 936.353993][ T1041] dump_stack+0x172/0x1f0 [ 936.358398][ T1041] panic+0x2cb/0x65c [ 936.362299][ T1041] ? __warn_printk+0xf3/0xf3 [ 936.366916][ T1041] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 936.372554][ T1041] ? ___preempt_schedule+0x16/0x18 [ 936.377672][ T1041] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 936.383832][ T1041] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 936.389984][ T1041] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 936.396139][ T1041] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 936.402300][ T1041] watchdog+0x9c8/0xec0 [ 936.406467][ T1041] kthread+0x357/0x430 [ 936.410535][ T1041] ? reset_hung_task_detector+0x30/0x30 [ 936.416083][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 936.422328][ T1041] ret_from_fork+0x3a/0x50 [ 936.427557][ T1041] Kernel Offset: disabled [ 936.431883][ T1041] Rebooting in 86400 seconds..