&(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfe800000, 0x0, 0x0, 0x0) 15:54:55 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 731.675159] ISOFS: Unable to identify CD-ROM format. 15:54:55 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x1300}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:54:55 executing program 5: bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfec00000, 0x0, 0x0, 0x0) 15:54:56 executing program 5: bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:56 executing program 5: bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0) 15:54:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:54:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffe8) 15:54:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:54:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xff000000, 0x0, 0x0, 0x0) 15:54:56 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x6000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:54:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 732.572645] ISOFS: Unable to identify CD-ROM format. 15:54:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xff030000, 0x0, 0x0, 0x0) 15:54:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xffff0000, 0x0, 0x0, 0x0) 15:54:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:54:57 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xf000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:54:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:54:57 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x2}}, 0x18) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000300)={{0x0, 0x1, 0x7, 0x1, 'syz0\x00', 0x4}, 0x0, [0x9, 0x1, 0x8001, 0x5, 0xb1, 0x9, 0xfffffffffffffe00, 0xfffffffffffffffa, 0x7, 0xffff, 0x3f, 0x80000000, 0x3, 0xf7, 0x8, 0x80000, 0xff4, 0x5, 0x295, 0x2, 0x9, 0x7ff, 0x52, 0x100, 0xffffffffffffffff, 0xcb4c, 0xe2, 0x810, 0x1, 0x8, 0x8, 0x408, 0x6, 0x81, 0x8, 0x80, 0x0, 0x7, 0x7fe, 0x1, 0x6, 0x401, 0x2, 0x20, 0x9, 0x3, 0x7, 0x10000, 0x6, 0xfff, 0x4, 0x1000, 0x5, 0x5, 0x2, 0x9180000000000000, 0x9, 0x4f65, 0x7f, 0x40, 0x7, 0x77, 0x7f, 0x8000, 0x7f1, 0xe3, 0xffffffff, 0xc443, 0xb5, 0x800, 0x40, 0x1, 0x0, 0xc1, 0xff, 0x6, 0xffff, 0x100000001, 0x6, 0xfffffffffffffca1, 0x9, 0x7, 0xfffffffffffffffc, 0xfff, 0x100, 0x2, 0x101, 0x3, 0x8, 0x6, 0x5, 0x0, 0xfffffffffffff2f8, 0x2fec, 0x7ff, 0x200, 0x0, 0xd8cf, 0x401, 0x3, 0x380, 0x100000000, 0x8001, 0x8, 0x0, 0x300, 0x5, 0x4, 0x6, 0x7, 0x3f, 0x89c, 0x3f, 0x6, 0xf4, 0x5, 0xe223, 0x5, 0x3ff, 0x4, 0xfffffffffffffffd, 0x4, 0x5, 0x5, 0x9, 0x8000, 0x6, 0x2], {0x77359400}}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x20c080, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) ioctl$RTC_VL_READ(r8, 0x80047013, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000800)={{0x2, 0x3, 0x3, 0x3ff, 'syz1\x00'}, 0x1, [0x80000000, 0x800, 0x2, 0x1, 0x2, 0x9, 0x81, 0x5, 0x3, 0x4, 0x10001, 0x20, 0x8, 0x3ff, 0x9, 0x1e, 0x80000001, 0xfdb, 0x0, 0x5, 0x5, 0x7, 0x0, 0xfffffffeffffffff, 0x4, 0x8f29, 0x20, 0x80000000, 0x7, 0x7, 0x3, 0x6, 0x4, 0x7, 0x3f, 0x1, 0x6, 0xffff, 0x3, 0x4, 0xf4b, 0x4, 0xfa9, 0xb641, 0x200, 0x5, 0x6, 0x7ff, 0x1bcc, 0x1, 0x5, 0x4, 0x7, 0x13ba, 0xfffffffffffffff7, 0x7fffffff, 0x3, 0x7f0, 0x9, 0x7, 0x1000, 0x6, 0x3e4, 0xffffffffffffff0c, 0x1f, 0x7, 0x5, 0x0, 0x7, 0x9, 0x82, 0x3f, 0x5, 0x100000000, 0x1f, 0x8, 0x6, 0xffff, 0x1b, 0x4, 0x8, 0x8, 0xbdc, 0x81, 0x7, 0x9fb, 0x10000, 0xbe, 0x0, 0x7, 0x8, 0xfffffffffffffffc, 0x6, 0x0, 0x5, 0x9, 0x9, 0xfffffffffffeffff, 0x1ff, 0x8, 0x7fffffff, 0x8, 0x4000000, 0x3f, 0x2, 0x7, 0x1000, 0x2, 0x1, 0xffffffffffffff80, 0x254f3798, 0x8, 0x2, 0x400, 0x6, 0x5, 0x7fffffff, 0x7, 0xfffffffffffff001, 0x2, 0x4, 0x2, 0xb9, 0x8, 0x8, 0x0, 0x3, 0x2], {0x0, 0x1c9c380}}) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000240)={@empty, @local, @remote, 0x1, 0x3, 0x0, 0x100, 0x0, 0x40, r7}) r9 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r10, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:54:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffdef, 0x0, 0x0, 0x0) 15:54:57 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 733.134904] ISOFS: Unable to identify CD-ROM format. 15:54:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 15:54:57 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:57 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, 0x0, 0x0) 15:54:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xffffff8d, 0x0, 0x0, 0x0) 15:54:57 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, 0x0, 0x0) 15:54:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:54:57 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x8000a0}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:54:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 15:54:57 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, 0x0, 0x0) 15:54:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:54:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) getrusage(0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:54:57 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0) [ 733.690073] ISOFS: Unable to identify CD-ROM format. 15:54:57 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x10000000000, 0x0, 0x0, 0x0) 15:54:58 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x7ffffffff000, 0x0, 0x0, 0x0) 15:54:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:54:58 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x80ffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:54:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:54:58 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0x2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110a400000000009594000000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffc4b}, 0x48) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'hwsim0\x00', r4}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/54, 0x36, 0x1, &(0x7f0000000040)={0x11, 0x7, r4, 0x1, 0x6, 0x6, @local}, 0x14) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') io_setup(0x1000, &(0x7f00000000c0)=0x0) io_cancel(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x2, r2, &(0x7f0000000300)="bbb99773585a114987cd4c4f7494ab100bcc8c1403a79c9f10d7a3708a313007767e4c6efd87b8da011bc7306faaae9fd64c503478e45f83ac9e68be2782b2142e4d042629dc2c600022b56e0615f19686189ad36d2486b1ff4a1a8a6fcb72e9635c4001ce81154cb9e88fdb1e852bdf7693ed725010d44717f56939686d5b04750a92c97a50ad1120b2b7fdf5a4ee33c9b514b6c2684e349991a258c9a36c7a3e570277a2d8fa20f400ba014c5bbf24e04632ddaac7e0c4df40368d7301", 0xbe, 0x8001}, &(0x7f0000000240)) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000280)=0x9, 0x4) setns(r5, 0x0) ioctl$IMADDTIMER(r5, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = gettid() fcntl$setown(r1, 0x8, r9) r10 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r11, r7, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:54:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0) 15:54:58 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 734.188104] ISOFS: Unable to identify CD-ROM format. 15:54:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x8000a0ffffffff, 0x0, 0x0, 0x0) 15:54:58 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x2, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xf0ffffff7f0000, 0x0, 0x0, 0x0) 15:54:58 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x6, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 15:54:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:54:58 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xf0ffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:54:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:54:58 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x2}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:58 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x6}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x103000000000000, 0x0, 0x0, 0x0) 15:54:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xffffffffffffff32) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, @in={0x2, 0x4e23, @rand_addr=0x1}], 0x4c) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r4, 0x110, 0x4, &(0x7f0000000280)=0x2, 0x4) epoll_create1(0x80000) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000008caf425b00030000000000000000000000000000000000000000000000000000000000000000002f00"/88], 0x58) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000000)=""/201, &(0x7f0000000140)=0xc9) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 734.756553] ISOFS: Unable to identify CD-ROM format. 15:54:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 15:54:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default={0x98, 0x92, 0x9c, 0xaa, 0xb0, 0x40, 0x6}, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:54:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 15:54:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x2}, @remote, @default]}, 0x48) 15:54:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 15:54:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:54:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x6}, @remote, @default]}, 0x48) 15:54:59 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x1000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:54:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:54:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 15:54:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x4, 0x7}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:54:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default={0x98, 0x92, 0x9c, 0xaa, 0xb0, 0x40, 0x6}]}, 0x48) 15:54:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0) [ 735.242470] ISOFS: Unable to identify CD-ROM format. 15:54:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x10) 15:54:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 15:54:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x20000248) 15:54:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 15:54:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:54:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000000)={0x4, 0x6, 0x6, 'queue0\x00', 0x1}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 15:54:59 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x2000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:54:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:54:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000300)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xffffffe3, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r2, &(0x7f0000000140)='I', 0x1, 0x4007ffd, 0x0, 0x0) shutdown(r2, 0x1) recvfrom(r2, 0x0, 0xffffffffffffff50, 0x21, 0x0, 0xb278) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r6 = dup2(r5, r4) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80100, 0x0) syz_kvm_setup_cpu$x86(r7, r6, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="0f61bfd500660f71e2fc440f20c0663504000000440f22c06766c7442400c20000006766c74424020e0000006766c744240600000000670f011424f30fa7c00f1c320f20d86635200000000f22d836670f01c4f30f52be9e4ef658bd", 0x5c}], 0x1, 0xa, &(0x7f0000000140)=[@dstype0={0x6, 0xa}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r8, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:54:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 15:54:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x8}, [@null, @default, @bcast, @null, @bcast, @rose, @bcast, @default]}, 0x48) [ 735.737131] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 735.773231] ISOFS: Unable to identify CD-ROM format. 15:55:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 15:55:00 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000040)={{0x7, 0xfd, 0x0, 0xfa, 0x1f, 0x7f}, 0x9a9, 0x5, 0x2, 0x800, 0x6, "11fc1131caba88a661fe6093823ab80ef973ebaf1e6cf6b248a6a0a4982b5ba8e5070dd11e291c7329c5ae748b0ec88b1cfe63c4d030a1dbeb3463c7cd381c22e45f2922510daa5e626aceadeea0dba4a6630d600106ae74f768b9e092efd5b241f23d95a0d8ec9214a357f60f7f22a0ffaa6a93fcc9155c46b7c69a1a1e2d3f"}) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000000100)=""/154, &(0x7f00000001c0)=0x9a) 15:55:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) 15:55:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r8, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) fanotify_init(0x40, 0x2) 15:55:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) 15:55:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 15:55:00 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x4000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:00 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}, 0x48) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x208100, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) bind$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) 15:55:00 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 736.331937] ISOFS: Unable to identify CD-ROM format. 15:55:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) 15:55:00 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose, @remote, @default]}, 0x48) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x9}, 0x4) 15:55:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x2100000000000000, 0x0, 0x0, 0x0) 15:55:00 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xa000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 736.638441] device bridge_slave_1 left promiscuous mode [ 736.658621] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.717022] device bridge_slave_0 left promiscuous mode [ 736.723712] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.928545] device hsr_slave_1 left promiscuous mode [ 742.971124] device hsr_slave_0 left promiscuous mode [ 743.030219] team0 (unregistering): Port device team_slave_1 removed [ 743.052001] team0 (unregistering): Port device team_slave_0 removed [ 743.074178] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 743.130908] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 743.272178] bond0 (unregistering): Released all slaves 15:55:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r5, 0xc008ae09, &(0x7f0000000040)=""/104) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x3000000000000000, 0x0, 0x0, 0x0) 15:55:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:07 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x40, 0xd00) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000040)={r2, 0x3ff}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:07 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xe000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 743.428741] ISOFS: Unable to identify CD-ROM format. 15:55:07 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 15:55:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='nsQB\x12\x05\xc9A\xe6\x1eC\x05\ff\xb3Uu\x808\x1f \x05\b\x00\x00\x00\x00\x00\x00\x004|\xe7N\xa7\xb0_?\x84') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:07 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') signalfd(r0, &(0x7f0000000080)={0xfff}, 0x8) setns(r1, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x4) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 743.674319] ISOFS: Unable to identify CD-ROM format. 15:55:07 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x13000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:07 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4bb, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x3f, 0x6}) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000140)={0x18, 0xf, 0x1, {{0x80, 0x2, 0x7}, 0xff}}, 0x18) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r4, 0xc0305616, &(0x7f0000000180)={0x0, {0xfffffffa, 0x401}}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f0000000080)) 15:55:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 15:55:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x959fa402ea76dc3f, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r3, 0xc0305615, &(0x7f0000000040)={0x0, {0x1000, 0x7}}) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x7be) [ 743.902850] ISOFS: Unable to identify CD-ROM format. 15:55:08 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000000)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) 15:55:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:08 executing program 5: bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x7fff, 0x800) 15:55:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:08 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x60000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000000)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:08 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, 0x48) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x407b, 0x4000) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept4$ax25(r2, &(0x7f0000000000)={{0x3, @bcast}, [@null, @bcast, @bcast, @rose, @null, @null]}, &(0x7f0000000080)=0x48, 0x40800) 15:55:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x5800000000000000, 0x0, 0x0, 0x0) [ 744.213851] ISOFS: Unable to identify CD-ROM format. 15:55:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:08 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x101400, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0x6, 0x11, 0x0, r2}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @broadcast}, &(0x7f0000000040)=0xc) seccomp(0x0, 0x0, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0x8, 0x7f, 0x4, 0xffff}, {0x7d09, 0x4, 0x6, 0xfffffffe}, {0x1, 0xdf, 0x4, 0xdd}, {0x6, 0x3f, 0x9, 0x81}, {0x6d, 0x20, 0x1, 0x64}, {0x6000, 0x7, 0x56, 0x10001}]}) 15:55:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) ioctl$KDDISABIO(r5, 0x4b37) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xcc41, 0x400000) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r7, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r7, 0xc0105303, &(0x7f0000000040)={0xfd, 0x1, 0x7f}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r8, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:08 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xa0008000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 744.479686] ISOFS: Unable to identify CD-ROM format. 15:55:08 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose, @bcast, @default]}, 0x48) 15:55:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0) 15:55:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x20000, 0x0) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000000040)=0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x222) 15:55:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:08 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rxrpc(0x21, 0x2, 0x2) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110a400000000009500800000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffc4b}, 0x48) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'hwsim0\x00', r3}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', r3}) 15:55:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 744.749847] ISOFS: Unable to identify CD-ROM format. 15:55:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f0000000080)={0x58, 0x7d, 0x2, {0x0, 0x51, 0xa2, 0x0, {0x92a58e418ffef91, 0x2}, 0x1000000, 0x7, 0xfffffffe, 0xa6, 0x5, 'syz0\x00', 0xe, '+vmnet0:md5sum', 0x4, 'ppp0', 0x7, 'ns/pid\x00'}}, 0x58) setns(r0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r2, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @default, @remote, @default]}, 0x48) 15:55:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x8004020000000000, 0x0, 0x0, 0x0) 15:55:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:09 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xffff8000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:09 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$ax25(r2, &(0x7f0000001340)={{0x3, @rose}, [@netrom, @bcast, @remote, @remote, @default, @bcast, @default, @bcast]}, &(0x7f00000013c0)=0xfffffffffffffefa) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r5, r3) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000140)={0x1, 0x1, 0x1000, 0x1000, &(0x7f0000000300)="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", 0xc1, 0x0, &(0x7f0000001400)="9e18f2a0fe084681b94528eaac468bc4fb5eda2952ae81f611d65584d3623e91e16eff4036584b8cf2ac3baaf7044601c1eda8964b811a09ef7ef91f3e2d7a711d448426b8a1092cdbf5197b19a5a990bdc3ebc8e085372a93d5f8c15af78cb94d93c232828ca3c4f6f99a0eb9ec521a95a1194466167a34e26603edbd5d6e631febb8ff731ac4df8281e7c28f0ba0ff713ef0e35bf3a44956c27126207936865fbd7f531f7bd37dcf4db461c1f8ab5e10999edabbea5997ac25d91ed23cbb01ef"}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r8, r0, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:09 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000280)={@remote, 0x0}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001340)={@multicast1, @loopback, 0x0}, &(0x7f0000001380)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000001a40)=0xe8) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000001a80)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast2}}, &(0x7f0000001b80)=0xe8) r8 = socket$rxrpc(0x21, 0x2, 0x2) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffc4b}, 0x48) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'hwsim0\x00', r10}) r11 = socket$rxrpc(0x21, 0x2, 0x2) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r12, 0x84, 0x8, &(0x7f0000000140)=0x16fe5ada, 0x4) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffc4b}, 0x48) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'hwsim0\x00', r14}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001f00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001bc0)={0x2d8, r1, 0x292, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0xb4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8}, {0xf8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xa0}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xcd35}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x7c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r14}}}]}}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x10}, 0x800) r15 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r15, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/k\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc\'capi/capi22\x00', 0xa0000, 0x0) connect$caif(r6, &(0x7f00000000c0), 0x18) ioctl$SG_SET_TIMEOUT(r5, 0x2201, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') ioctl$PPPIOCGL2TPSTATS(r5, 0x80487436, &(0x7f0000000040)="38457b9b8ed5255c103c395aca89f3851f1c1b0420a1e2336833b3d09e54d2") syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 745.146384] ISOFS: Unable to identify CD-ROM format. 15:55:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x8405000000000000, 0x0, 0x0, 0x0) 15:55:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:09 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x8b0363a65a69ff2e) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0x1ff, 0xa, 0x5, 0xfffffffe, r2}, &(0x7f00000000c0)=0x10) 15:55:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000040)={0x0, 0xa286}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) setns(r7, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4040aea0, &(0x7f0000000000)={0xfe, 0x1, 0x2, 0x0, 0x10001, 0x1, 0x7f, 0x7f, 0x7, 0x5, 0x20, 0x3, 0x0, 0x3, 0x3, 0x3, 0x20, 0x3a, 0x6f}) 15:55:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:09 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xfffff000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:09 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={r4, 0x200}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r5, 0x3}, 0x8) bind$ax25(r0, &(0x7f0000000000)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose, @remote, @default]}, 0x48) [ 745.447596] ISOFS: Unable to identify CD-ROM format. 15:55:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x3ff4f53b80e4e7f0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x10001, 0x9, "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", 0xbd, 0x6, 0x25, 0x81, 0x20, 0x1}, r2}}, 0x120) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r6}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x8dffffff00000000, 0x0, 0x0, 0x0) 15:55:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 15:55:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:09 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x8000a0ffffffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 745.727582] ISOFS: Unable to identify CD-ROM format. 15:55:09 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) pipe2(&(0x7f0000000140), 0x40000) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$dupfd(r1, 0x80c, r2) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) r7 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r8, 0x1, 0x2e, &(0x7f0000000100)=0x51, 0x4) listen(r8, 0x26) recvmmsg(r8, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x40000000000001d, 0x0, 0x0) listen(r8, 0x0) shutdown(r8, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) fsetxattr$security_ima(r9, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02ce07e4a24ead34196d"], 0xa, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r12, 0x0) ioctl$TIOCGPGRP(r12, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r13, &(0x7f0000000000)='ns/pid\x00') 15:55:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 15:55:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xac05000000000000, 0x0, 0x0, 0x0) [ 745.964661] ISOFS: Unable to identify CD-ROM format. 15:55:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='\x82v\xb8\x9b\xbcU\xd1\xdfW\xbd\x95\x1b\x8e9\xe7\xafm$\x88\xfd\x97\'\"oP&,\xc4/\x85\x1a\xc9\xad\x89\xecA\\\v\a\xa54\x00bG\x81\xad\xb5+\x19:r\xf8\x8c\xeb\x82\xe7\xc1|1\'\xa7-\xb3Q\"F\xb7\xe2\x930\xc8|\xe2\x05\x92f\f[\xab\xc8\xdfY\\Gy iJ\xa3\xb9\xa9\xe9`.\x9a\xc2\x84;\xf7\xb8\xd3\xa0\x14\xdbf\x90\xe8tuZ\x0e \xa1&k\xef\xf7+\xc1a+\x80\xcd\xa2\xcd\xd0S^W(&\xdd\xc2|t\x9d\xb2\x1e\x11\xe7!*\xf6\xfdb\x00{8\x14\xe8\x15u\tX\xc8o=R\x995\x86?\xd6\x12\xf5OXs\xac%{\x7f2\xae:X\xae\x02z\xc41K\'\x19\xf9\xfd\x9b\xc6vQ\x1d\xcc\x15C\'vE\xe0\xaf&s\xa9\xe9Z\xd5\xf1\x95\xf0\x8e\xb8\xc9\xee\r\x83T\x1c\x98\xcf\a\xd0\xfb\xed\x1c\rG\x8dr\xbf[L\x91T\xba\x85\xad\x1d\x04') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:10 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x80ffff00000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xe803000000000000, 0x0, 0x0, 0x0) 15:55:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:10 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x181000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@multicast2, @in6=@empty}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xfffffffffffffeb0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000180)={0xffff8001, 0x5}) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r2, &(0x7f0000002ac0)=[{{&(0x7f0000000280)=@pppol2tp, 0x80, &(0x7f0000000480)=[{&(0x7f0000000300)=""/119, 0x77}, {&(0x7f0000000380)=""/221, 0xdd}, {&(0x7f00000001c0)=""/47, 0x2f}], 0x3, &(0x7f00000004c0)=""/121, 0x79}, 0x6f}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/189, 0xbd}], 0x2, &(0x7f0000001640)=""/4096, 0x1000}, 0xcb}, {{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000002640)=""/29, 0x1d}, {&(0x7f0000002680)=""/41, 0x29}, {&(0x7f00000026c0)=""/87, 0x57}, {&(0x7f0000002740)=""/68, 0x44}], 0x4}, 0x9}, {{&(0x7f0000002800)=@nfc_llcp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000002880)=""/97, 0x61}, {&(0x7f0000002900)=""/176, 0xb0}, {&(0x7f00000029c0)=""/101, 0x65}], 0x3, &(0x7f0000002a80)=""/53, 0x35}, 0x1}], 0x4, 0x40000000, &(0x7f0000002bc0)={0x0, 0x989680}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) [ 746.440709] ISOFS: Unable to identify CD-ROM format. 15:55:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4002, 0x0) syz_kvm_setup_cpu$x86(r1, r5, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="3ef3420f5cbe4e000000b9110a00000f32f2450f0666baf80cb8fc9c3985ef66bafc0c66b898e866efc7442400f3a3f259c74424020c000000c7442406000000000f011424664e0f6e2b66bad104ed470f234bc4227d0f5b00440f01c8", 0x5d}], 0x1, 0x13, &(0x7f0000000140), 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:10 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xf0ffffffffffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xeffdffff00000000, 0x0, 0x0, 0x0) 15:55:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) [ 746.711846] ISOFS: Unable to identify CD-ROM format. 15:55:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000000)={0x7}, 0x2) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x7, 0x4, 0x480, 0x258, 0x258, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000040), {[{{@arp={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, @mac, {[0x7f, 0x0, 0x0, 0xff, 0x0, 0x7f]}, @empty, {[0x0, 0x0, 0x0, 0xf7228ece9a16de5f, 0xff]}, 0x81, 0x9, 0x400, 0x7fff, 0x2, 0x7, 'tunl0\x00', 'ip6_vti0\x00', {0xff}, {}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0xffffffff}}}, {{@arp={@multicast2, @dev={0xac, 0x14, 0x14, 0xf}, 0x0, 0x0, @empty, {[0xff, 0xff, 0x0, 0xff]}, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff, 0xff]}, 0x800, 0x401, 0x2, 0x161, 0x9e3, 0x3f, 'irlan0\x00', 'hwsim0\x00', {0x181}, {0xff}, 0x0, 0x41}, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x5}}}, {{@arp={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xffffffff, @mac=@remote, {[0x0, 0x1fe, 0x0, 0xff]}, @mac, {[0x0, 0x1fe, 0x0, 0x0, 0x0, 0xff]}, 0x7f, 0x3f, 0x8, 0x7, 0x26, 0x8001, 'veth1_to_bridge\x00', 'gre0\x00', {}, {0x101}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @loopback, @loopback, 0x8, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xf401000000000000, 0x0, 0x0, 0x0) 15:55:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) [ 746.945204] ISOFS: Unable to identify CD-ROM format. 15:55:11 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9a, 0x100) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000100)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x150302, 0x0) bind$ax25(r1, &(0x7f0000000000)={{0x3, @netrom, 0x1}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @rose, @remote, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0xfffffcd2) 15:55:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:11 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x100000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r2}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 15:55:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x40) [ 747.378533] ISOFS: Unable to identify CD-ROM format. 15:55:11 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x50142) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000080)={0x10001, 0x7ff, 0x3, 0x1, 0x10000, 0x7fffffff, 0x400}) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='\x03\x00\x00\x00\b') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000180)={0x3}) setns(r2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e21, 0xffff, @ipv4={[], [], @loopback}, 0x6}, {0xa, 0x4e20, 0x0, @rand_addr="88577ad874826f22413158baac3e26c7", 0x9}, 0xb4, [0x4, 0xbc9, 0x400, 0x1f, 0x1, 0x4c, 0x47c, 0x1f]}, 0x5c) 15:55:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r6 = epoll_create(0x0) fsetxattr$security_selinux(r6, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:sound_device_t:s0\x00', 0x24, 0x1) 15:55:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfc00000000000000, 0x0, 0x0, 0x0) 15:55:11 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x5, 0x1) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000300)={0xd31d, 0x2, 0x2, 0x5, 0x8, 0x40, 0x2e9}) getsockopt$packet_buf(r1, 0x107, 0x19, &(0x7f00000001c0)=""/16, &(0x7f0000000280)=0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) setsockopt$rose(r3, 0x104, 0x8, &(0x7f00000000c0)=0x6, 0x4) setns(r2, 0x0) write$selinux_load(r2, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "b979a3c4d05816fc4385f00afb87c10d9c946c09e137bacc047e2264ca9d75f5bf1d38e16809da88d63dd97e285de2f2a615bba7856d1b9aa76697342263e6224fa7ee9438a7d6b8b22adee3a6d99995432d263ac10e03ef233e8724d87c45001914a71fc17e263c55a0655c9af03c445f7f5e936a83"}, 0x86) ioctl$KDENABIO(r2, 0x4b36) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x8001, 0x600000) setns(r4, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) write$P9_RXATTRCREATE(r4, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) [ 747.606561] ISOFS: Unable to identify CD-ROM format. 15:55:11 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x200000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fff", 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\xcbr\xd0\x1dD\xa3\xf0\t\xdc\xd9\x87\x00\x00\x00\x00\x00\x00\x00\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fff", 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={r2, 0x4, "6300e61c"}, &(0x7f0000000140)=0xc) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) bind$ax25(r3, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000040)={0x4, 0x9, 0x8, 'queue1\x00', 0xfff}) 15:55:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfe80000000000000, 0x0, 0x0, 0x0) 15:55:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fff", 0x0, 0x100, 0x6000000000000000}, 0x40) [ 747.841572] ISOFS: Unable to identify CD-ROM format. 15:55:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xffffffffff7ffffd) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = accept4(r4, &(0x7f0000000000)=@in6, &(0x7f0000000080)=0x80, 0x80000) getsockname$tipc(r5, &(0x7f00000000c0)=@name, &(0x7f0000000140)=0x10) r6 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:12 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x400000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000040006333", 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfec0000000000000, 0x0, 0x0, 0x0) 15:55:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4138ae84, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000240)=r7) r8 = syz_open_procfs(r7, &(0x7f0000000040)='attr/fscreate\x00') setns(r8, 0x0) write$cgroup_int(r8, &(0x7f0000000000)=0x7, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r9, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 748.076240] ISOFS: Unable to identify CD-ROM format. 15:55:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000040006333", 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:12 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xa00000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 748.343238] ISOFS: Unable to identify CD-ROM format. 15:55:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="140000002a000500d25a80648c00000006000000", 0x14}], 0x1}, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x1) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null}) 15:55:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000040006333", 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0) 15:55:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:12 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xe00000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac14", 0x0, 0x100, 0x6000000000000000}, 0x40) [ 748.729414] ISOFS: Unable to identify CD-ROM format. 15:55:12 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x13d800, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xc0c) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x57, 0x101000) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000080)) syz_init_net_socket$ax25(0x3, 0x5, 0x0) 15:55:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fchdir(r5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac14", 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xf, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:13 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) bind$ax25(r0, &(0x7f0000000200)={{0x3, @default, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xff00000000000000, 0x0, 0x0, 0x0) 15:55:13 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x1300000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac14", 0x0, 0x100, 0x6000000000000000}, 0x40) [ 748.994265] ISOFS: Unable to identify CD-ROM format. 15:55:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/mixer\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0x80304d65, &(0x7f0000000c80)) setns(r0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xbf, 0x19, &(0x7f0000000140)="add5db1e11ddbb427a19fa40bfec2a5442803f1d63e70128122fdbc8ec8f5d726732508e348ba2af39dd8a057311f87ab65e1171672a03b1c2d79bfd480b165d4d4397513e2c2383ab7c146c18b1229820bac96d591c66e52914ed96bca40b4e69a2903a6f093fd2ec53116982b00fe0e378b2fb364f3272002aab2979b80ebd5afab5eabbd4bb53a849fc32f645a0a3b49f1f76c9282d3e97781b5107d7983d9b9c8c2d52a97171b0794d69e9861bf01173a9f9338f31d7eb6a4bfa19b433", &(0x7f00000000c0)=""/25, 0x1, 0x0, 0x56, 0xc4, &(0x7f0000000280)="ab1a726078ea445fd87feb434f497116acca7fb70fd5ada7c5e627c1e0ff194bb814db82beb7ec852ca566359c9c8e679595a185bfd06dd03863d658a1570030ca7789eb4dec4be87a1e9842f0f7ac0690c726f23940", &(0x7f0000000300)="d85b9cb119d735b147ad7c36d78c5afcdca1339d8dcbe28e831841c4388396683af11a21b5a954758331c7c920a1b4bf9ba7ed95c3b340be4ae0ab6d365f1c37302d068fe9086370b43cf753ea1161b26faf4cefce91dc0e8ae701596c64b7481c7a220932d08f150a0e63c8fe9ae6fd56f0aa58059537878f28d8e3a4433cb025431c1e0dc313fd41c5cfa24cfeb6a9fa6a196ea20e217a4b6eb06e9600d0bd243c0df9f3ec0150f5e955932742868c17475e99b07474a1ec696d000000000000000000"}, 0x40) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x10840, 0x0) ioctl$UI_GET_VERSION(r5, 0x8004552d, &(0x7f0000000480)) ftruncate(r4, 0x79) setns(r3, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f0000000000)=0xc042, 0x4) bind$ax25(r2, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414", 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:13 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) 15:55:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xff03000000000000, 0x0, 0x0, 0x0) [ 749.251603] ISOFS: Unable to identify CD-ROM format. 15:55:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414", 0x0, 0x100, 0x6000000000000000}, 0x40) 15:55:13 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x2) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x400, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000040)={[0x0, 0x4, 0x2, 0x401, 0x8, 0x100000001, 0x0, 0xbe, 0x2, 0x5, 0xffffffffffffffc0, 0x2, 0x7, 0x2, 0x2da, 0x2], 0x2000, 0x188094}) 15:55:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000300)={r6, @in6={{0xa, 0x4e24, 0x8, @rand_addr="de1be284cdbc2c515fb5afec4488d8f2", 0x4}}, 0x94}, 0x90) r7 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$unix(0x1, 0x1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000001, 0x8011, r8, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r10 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x288, 0x200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fec000/0x3000)=nil, &(0x7f0000fe8000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fea000/0x4000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f0000fea000/0x3000)=nil, &(0x7f0000fea000/0x1000)=nil, &(0x7f0000000180)="09bf73bdd6158381c4d5ad2575df8fee0d54f175d43ec2614c8d5c72b25f2c12e20125a78c812dfc2824c1422e5899ce3070e9282305338bbf2e2977d59226974acf3c5565f4162473812c0ce1d751682eeddf2f716515d195b0c08fc894b0f125d44ab51b523989b14632fb665ebef868c7695117e380d4a2cef316d9d7772ce645d6ecf8c170ec24f619dc2b1444f0c4f0ab9d52d08654de1541d6d1fdf359195fdb9595e157f3bd6a5577", 0xac, r11}, 0x68) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r12, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x66, &(0x7f0000000040)={r13}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={r13, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r10, 0x84, 0x79, &(0x7f00000000c0)={r14, 0x6, 0x9}, 0x8) syz_kvm_setup_cpu$x86(r9, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:13 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x6000000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:13 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@bcast, @default, @null, @default, @bcast, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x141100, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000040)={0x9, 0x0, [], {0x0, @bt={0x600, 0x7b, 0x0, 0x1, 0x8000000000000000, 0xab, 0x7, 0x3, 0x7ff, 0x1, 0x8000, 0x8, 0x3, 0x1, 0x1e, 0x4}}}) 15:55:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414", 0x0, 0x100, 0x6000000000000000}, 0x40) [ 749.445099] ISOFS: Unable to identify CD-ROM format. 15:55:13 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='\x00\xab\n\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x6, 0x400000) r5 = dup2(r3, r4) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) r7 = socket$rxrpc(0x21, 0x2, 0x2) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40579fd4bd400006110a40000000000"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffc4b}, 0x48) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'hwsim0\x00', r9}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in=@multicast1, 0x4e21, 0x1000, 0x4e21, 0x1, 0x1c, 0xb9f55afd41053827, 0x0, 0x3a, r9, r10}, {0xffffffff, 0x8, 0xff, 0x1, 0x8, 0x5, 0x40, 0x3666}, {0x1, 0x1, 0x6409}, 0x5, 0x6e6bc0, 0x1, 0x0, 0x2, 0x1}, {{@in=@local, 0x4d3, 0x3c}, 0x2, @in=@broadcast, 0x3505, 0x4, 0x6, 0x80, 0x4, 0xfffffffc, 0x4}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r11, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r11, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xc) 15:55:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xffff000000000000, 0x0, 0x0, 0x0) 15:55:13 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8d4000, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)=""/224) 15:55:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x0, 0x6000000000000000}, 0x40) 15:55:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4138ae84, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000240)=r7) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r9 = syz_open_procfs(r8, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r9, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:13 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @default, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0xfffffffffffffed0) 15:55:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x0, 0x6000000000000000}, 0x40) [ 749.693358] ISOFS: Unable to identify CD-ROM format. 15:55:13 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xffffffffa0008000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:13 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstat(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x9000, 0x0) setresuid(0x0, r5, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0xffffffff) setns(r7, 0x0) setns(r7, 0x45000000) mount$9p_xen(&(0x7f0000000000)='*md5sumvboxnet1cgroup\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x1000000, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=xen,debug=0x0000000000000080,uname=eth1,debug=0x0000000000000004,posixacl,debug=0x000000000000037e,cache=mmap,nodevmap,mask=MAY_EXEC,context=user_u,euid=', @ANYRESDEC=r3, @ANYBLOB='\a\x00\x00\x00>', @ANYRESDEC=r5, @ANYBLOB="1d0003fbf5e4f269253e674317ab6f78dbb2fcffffffffffffffb4d82a832e"]) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) epoll_ctl$EPOLL_CTL_DEL(r7, 0x2, r1) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r8, 0x4018ae51, &(0x7f0000000180)={0x1, 0x3, 0x5f}) 15:55:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) ioctl$TIOCOUTQ(r6, 0x5411, &(0x7f0000000000)) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x13, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) 15:55:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x0, 0x6000000000000000}, 0x40) 15:55:14 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x1) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00', @ANYRES16=0x0, @ANYBLOB="949628bd7000fedbdf250400000008000600d5000000040004000400040014000100fe800000000000000000000000000022080003000000000004000400080006003f000000"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x2e938c1583f72236) syz_init_net_socket$ax25(0x3, 0x5, 0x0) [ 749.904623] ISOFS: Unable to identify CD-ROM format. 15:55:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 15:55:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r4, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:14 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @default, 0x5}, [@null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) 15:55:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x14, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 15:55:14 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0xfffffffffffff000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 750.136951] ISOFS: Unable to identify CD-ROM format. 15:55:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 15:55:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 15:55:14 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8480, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) r1 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0xe7b, 0x24000) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000300)={0x1a0000000, 0x100, "a55c3c6b95202653ba4ffb6cede9e3271c8452b465700fd5b0b3647cbc66f9c4", 0x401, 0x5, 0x6, 0x9, 0x7ff, 0x7, 0x0, 0x3, [0x10000, 0x1, 0x1]}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r5, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1300, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r11, 0x4138ae84, 0x0) fcntl$getownex(r11, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r10, 0x8902, &(0x7f0000000240)=r12) r13 = syz_open_procfs(r12, &(0x7f0000000180)='net/rpc\x00') r14 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r13, 0x2, r14) syz_kvm_setup_cpu$x86(r9, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x15, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 15:55:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)=0xe6) r3 = syz_open_dev$dspn(&(0x7f0000001340)='/dev/dsp#\x00', 0x50, 0x200) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000001480)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r7, 0x0) ioctl$KVM_GET_PIT(r7, 0xc048ae65, &(0x7f00000013c0)) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_VERSION(r8, 0xc0406400, &(0x7f0000000080)={0x120, 0x3, 0x1ff, 0xc0, &(0x7f0000000140)=""/192, 0x1000, &(0x7f0000000300)=""/4096, 0x8c, &(0x7f0000000200)=""/140}) r9 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r10, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r11, 0x0) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f0000001300)={0x2, &(0x7f00000000c0)=[{}, {0x0}]}) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) write$binfmt_aout(r13, &(0x7f0000001440)={{0x108, 0x3f, 0x1c, 0x88, 0x392, 0x3498, 0x22a, 0x1ff}, "28d7de2e5a"}, 0x25) ioctl$DRM_IOCTL_GET_SAREA_CTX(r11, 0xc010641d, &(0x7f0000001380)={r12, &(0x7f0000001340)}) 15:55:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) [ 750.436196] ISOFS: Unable to identify CD-ROM format. 15:55:14 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x2}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0xffffffffa0008000, 0x0, 0x0, 0x0) 15:55:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x16, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 15:55:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/k~m\x00', 0x681082, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 750.664491] ISOFS: Unable to identify CD-ROM format. 15:55:14 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r8, 0x4138ae84, 0x0) fcntl$getownex(r8, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r7, 0x8902, &(0x7f0000000240)=r9) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r12) r13 = gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r15) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) r17 = socket(0x10, 0x2, 0xfe) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r18, 0x0) r19 = getgid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r21, 0x4138ae84, 0x0) fcntl$getownex(r21, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r20, 0x8902, &(0x7f0000000240)=r22) r23 = socket(0x4, 0x5, 0x1) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r24, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r25) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r26) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r27) getgroups(0x7, &(0x7f0000000440)=[r25, 0xffffffffffffffff, 0x0, r26, 0xffffffffffffffff, r27, 0xee01]) r29 = open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x1) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r31, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r32, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r34 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r34, 0x4138ae84, 0x0) fcntl$getownex(r34, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r33, 0x8902, &(0x7f0000000240)=r35) r36 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r37, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r39 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r39, 0x4138ae84, 0x0) fcntl$getownex(r39, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r38, 0x8902, &(0x7f0000000240)=r40) r41 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r41, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r42, 0x0) r43 = getegid() r44 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dlm-monitor\x00', 0x800, 0x0) sendmsg$unix(r44, &(0x7f0000000640)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="5284f75ad85ae35e0852a4a0f538f12643961a243cd0834b8ef3842967f1d38dece7db5e0485a0570bc9cb7864586b704323582912cb402ff66238561fdd91e498e79cd6b5c9f1bdf37897ca18b9affacddb9a69bdac717815f6156a347db45df558d295a7248acf3a18e19aa1bb5c36e9d5ff49af4b296bae7e05abe93e424b1e100893b17d24e9655710bacaad13b570cabd8439a5c8e931e750f4c6efe283de950a3cccefdb15cec7a69d155f3978664489fe48d4abdff1a11d71ddac25bb90effa8f2fa3edefc4dcc04c31af9afed19d158a7fe555c45a", 0xd9}, {&(0x7f0000000180)="c6e2f30dc75178c5b632e43e2ae02bac120f3e0d4263282a8436f8876657e954350a059ba7", 0x25}], 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=0xee01, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="000000001c0000000000000001000000025492c210e8c0000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r16, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r22, @ANYRES32=r24, @ANYRES32=r28, @ANYBLOB="00000000240000000000000001000420b044a3b4", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r29, @ANYRES32=r30, @ANYRES32=r31, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r35, @ANYRES32=r37, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r40, @ANYRES32=r42, @ANYRES32=r43, @ANYBLOB='\x00\x00\x00\x00'], 0x148, 0x400}, 0x20040810) 15:55:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f0000000080)={0x58, 0x7d, 0x2, {0x0, 0x51, 0xa2, 0x0, {0x92a58e418ffef91, 0x2}, 0x1000000, 0x7, 0xfffffffe, 0xa6, 0x5, 'syz0\x00', 0xe, '+vmnet0:md5sum', 0x4, 'ppp0', 0x7, 'ns/pid\x00'}}, 0x58) setns(r0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r2, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @default, @remote, @default]}, 0x48) 15:55:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000000)={0x7, 0xe, 0xc, "92c1b3c96d815342f8ca476b54368ca69bba24e92cd11e851673b1d59719bd81b2cbf6a00781113b998a00a804d7da48dd780d022338d180ea8e58cb", 0x35, "8ebd0abaadef8b07e2a5c1f92d11db454c272ff79f01369d9f3e1965b23687617b758bf80a66c9f814eed19d2c33fc3ff92158b73f025e55cee30b5f", 0x8}) 15:55:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x17, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 15:55:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x20000, 0x0) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000000040)=0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0x222) 15:55:15 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x4}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x529, 0x128000) clock_adjtime(0x7, &(0x7f0000000140)={0x62, 0x7, 0x28, 0x0, 0x100000000, 0x1, 0x3ff, 0x80000000, 0xfffffffffffffffd, 0x5, 0xc000000000000, 0x400, 0x54, 0x1, 0x4, 0x101, 0x1, 0x152, 0xfffffffffffffff8, 0x40100, 0x10001, 0x401, 0x6, 0xf22, 0x1, 0x7fffffff}) syz_open_dev$sndtimer(&(0x7f0000001940)='/dev/snd/timer\x00', 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$selinux_attr(r3, 0x0, 0xfffffffffffffff1) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000200)) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000004c0)=@req={0x28, &(0x7f0000000480)={'vlan0\x00', @ifru_settings={0x7, 0x0, @cisco=0x0}}}) r4 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) timer_create(0x0, 0x0, 0x0) r5 = dup(r4) inotify_add_watch(r3, &(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(r4, 0x6, 0x0, &(0x7f0000000380)=""/234, &(0x7f0000000300)=0xea) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) inotify_add_watch(r6, &(0x7f0000000340)='./bus\x00', 0x20000000) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r7, 0x4038ae7a, &(0x7f0000000180)={0x2, 0x8c8, &(0x7f0000000240)="30bdada1768a80b94c6eb0f0079955e983d6e8f52a31ea916d586fd68f1153900069da43ac4f1f2c2e59bc1be0513c1531fccb90b8e6f6229176f652e29b8d536346d9234c1a8f39262abdf26ed379b63d95285ff56d4f48481560df769b358bab7fcf19d2745933af4ddc133bcfd799fa3aa559cb339e30d7624dc5dfcd839352996e46", &(0x7f0000000500)="345b0004ed210a54344700e8d7867509d299b26687e6384fed8ec95b7c299442a656a4b3cb57ae55b648046bb059e28d9e0e892d9f676dd34b8247b53fef15c9c20cb82e8e345728701dbe299f5f36ad563d7efa878450c2087c25f2060ac38f0e1dc2e4fe35f504f124b1fd75970f6f6c32b03b4b77bee3f3b6dec9a9a4a5", 0x84, 0x7f}) ftruncate(r6, 0x7fff) [ 750.927721] ISOFS: Unable to identify CD-ROM format. 15:55:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x3, 0x0, 0x0) 15:55:15 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0x2) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x80000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_mmap='cache=mmap'}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) preadv(r6, &(0x7f0000001880)=[{&(0x7f00000003c0)=""/151, 0x97}, {&(0x7f0000000480)=""/103, 0x67}, {&(0x7f0000000500)=""/124, 0x7c}, {&(0x7f0000000580)=""/108, 0x6c}, {&(0x7f0000000600)=""/27, 0x1b}, {&(0x7f0000000640)=""/11, 0xb}, {&(0x7f0000000680)}, {&(0x7f00000006c0)=""/253, 0xfd}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/172, 0xac}], 0xa, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00@@', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000000)={r7, @in6={{0xa, 0x4e24, 0x800, @remote}}}, 0x84) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f00000001c0)="94540e80babc0cfea182dadee120e853", 0x10) 15:55:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x18, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:15 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 751.128082] ISOFS: Unable to identify CD-ROM format. [ 751.154446] FAULT_INJECTION: forcing a failure. [ 751.154446] name failslab, interval 1, probability 0, space 0, times 0 [ 751.193536] CPU: 0 PID: 27370 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 751.200475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.209827] Call Trace: [ 751.212407] dump_stack+0x172/0x1f0 [ 751.216021] should_fail.cold+0xa/0x1b [ 751.219898] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 751.224985] ? lock_downgrade+0x810/0x810 [ 751.229127] __should_failslab+0x121/0x190 [ 751.233347] should_failslab+0x9/0x14 [ 751.237133] __kmalloc+0x2e2/0x750 [ 751.240655] ? kasan_check_read+0x11/0x20 [ 751.244789] ? bpf_test_init.isra.0+0x95/0x100 [ 751.249356] bpf_test_init.isra.0+0x95/0x100 [ 751.253748] bpf_prog_test_run_skb+0x11e/0xb20 [ 751.258318] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 751.263139] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 751.268659] ? fput+0x128/0x1a0 [ 751.271926] ? __bpf_prog_get+0x97/0x290 [ 751.275967] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 751.280795] bpf_prog_test_run+0x129/0x1a0 [ 751.285017] __x64_sys_bpf+0x397/0x4c0 [ 751.288890] ? bpf_prog_get+0x20/0x20 [ 751.292679] ? do_syscall_64+0x26/0x620 [ 751.296638] ? lockdep_hardirqs_on+0x415/0x5d0 [ 751.301226] ? trace_hardirqs_on+0x67/0x220 [ 751.305539] do_syscall_64+0xfd/0x620 [ 751.309333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.314508] RIP: 0033:0x459a29 [ 751.317690] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 751.336571] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 751.344272] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 15:55:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x19, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:15 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xa}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_MCAST_MSFILTER(r7, 0x0, 0x30, &(0x7f0000000300)={0xfffff0f1, {{0x2, 0x4e21, @broadcast}}, 0x1, 0x2, [{{0x2, 0x4e23, @local}}, {{0x2, 0x4e23, @loopback}}]}, 0x190) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r8, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 751.351523] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 751.358779] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 751.366035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 751.373284] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:15 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4, 0x0, 0x0) [ 751.552543] ISOFS: Unable to identify CD-ROM format. 15:55:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) inotify_add_watch(r8, &(0x7f0000000000)='./file0\x00', 0x20) 15:55:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x22, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 751.727975] FAULT_INJECTION: forcing a failure. [ 751.727975] name failslab, interval 1, probability 0, space 0, times 0 [ 751.781085] CPU: 1 PID: 27389 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 751.788038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.791813] ISOFS: Unable to identify CD-ROM format. [ 751.797386] Call Trace: [ 751.797409] dump_stack+0x172/0x1f0 [ 751.797431] should_fail.cold+0xa/0x1b [ 751.797450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 751.797467] ? __might_fault+0x12b/0x1e0 [ 751.812619] __should_failslab+0x121/0x190 [ 751.812636] should_failslab+0x9/0x14 [ 751.826014] kmem_cache_alloc+0x47/0x700 [ 751.826033] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 751.826046] ? __phys_addr+0xa4/0x120 [ 751.826058] ? kasan_unpoison_shadow+0x35/0x50 [ 751.826075] __build_skb+0x3e/0x310 [ 751.851397] build_skb+0x21/0x1a0 [ 751.854855] bpf_prog_test_run_skb+0x1b7/0xb20 [ 751.859465] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 751.864305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 751.869861] ? fput+0x128/0x1a0 [ 751.873146] ? __bpf_prog_get+0x97/0x290 [ 751.877210] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 751.882058] bpf_prog_test_run+0x129/0x1a0 [ 751.886295] __x64_sys_bpf+0x397/0x4c0 [ 751.890201] ? bpf_prog_get+0x20/0x20 [ 751.894017] ? do_syscall_64+0x26/0x620 [ 751.898000] ? lockdep_hardirqs_on+0x415/0x5d0 [ 751.902585] ? trace_hardirqs_on+0x67/0x220 [ 751.907010] do_syscall_64+0xfd/0x620 [ 751.910843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.916036] RIP: 0033:0x459a29 [ 751.919241] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 751.938143] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 751.945851] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 751.953114] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 751.960380] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 751.967648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 751.974915] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x5, 0x0, 0x0) 15:55:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, &(0x7f0000cab000)=0x8) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e22, @multicast1}, 0x80, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)='vcan0\x00', 0x3, 0x5, 0x3}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) connect$l2tp(r9, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x1, {0xa, 0x4e20, 0x3, @mcast1, 0x5}}}, 0x3a) ioctl$KVM_SET_VCPU_EVENTS(r8, 0x4138ae84, 0x0) fcntl$getownex(r8, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r7, 0x8902, &(0x7f0000000240)=r10) r11 = syz_open_procfs(r3, &(0x7f00000000c0)='net/ip_vs_sth\x94r5>\"\xe2\x1b\xf5\x88\xe3') syz_kvm_setup_cpu$x86(r11, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:16 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xe}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:16 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:16 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000000800010006080700418e00000004fcff", 0x58}], 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20022400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x1) finit_module(r0, &(0x7f0000000000)='\x00', 0x6874a130114008e7) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0xfffffdb3) 15:55:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x23, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 752.113670] FAULT_INJECTION: forcing a failure. [ 752.113670] name failslab, interval 1, probability 0, space 0, times 0 [ 752.175931] CPU: 0 PID: 27410 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 752.182888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.192235] Call Trace: [ 752.194834] dump_stack+0x172/0x1f0 [ 752.198486] should_fail.cold+0xa/0x1b [ 752.202394] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 752.207506] ? __might_fault+0x12b/0x1e0 [ 752.211589] __should_failslab+0x121/0x190 [ 752.215832] should_failslab+0x9/0x14 [ 752.219641] kmem_cache_alloc+0x47/0x700 15:55:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) ioctl$KVM_SET_GSI_ROUTING(r6, 0x4008ae6a, &(0x7f0000000000)={0x1, 0x0, [{0x3, 0x4, 0x0, 0x0, @sint={0x9, 0xffffffff}}]}) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x14, r8, 0x415, 0x0, 0x0, {0x15}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xb8, r8, 0x4, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff3ea}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x281}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x43431793}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x240440c0}, 0x74c4417926b90df7) [ 752.223718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 752.229259] ? __phys_addr+0xa4/0x120 [ 752.233062] ? kasan_unpoison_shadow+0x35/0x50 [ 752.237665] __build_skb+0x3e/0x310 [ 752.241306] build_skb+0x21/0x1a0 [ 752.244772] bpf_prog_test_run_skb+0x1b7/0xb20 [ 752.249370] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 752.254218] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 752.259755] ? fput+0x128/0x1a0 [ 752.263024] ? __bpf_prog_get+0x97/0x290 [ 752.267073] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 752.271904] bpf_prog_test_run+0x129/0x1a0 [ 752.276129] __x64_sys_bpf+0x397/0x4c0 [ 752.280002] ? bpf_prog_get+0x20/0x20 [ 752.283793] ? do_syscall_64+0x26/0x620 [ 752.287754] ? lockdep_hardirqs_on+0x415/0x5d0 [ 752.292321] ? trace_hardirqs_on+0x67/0x220 [ 752.296633] do_syscall_64+0xfd/0x620 [ 752.300427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.305601] RIP: 0033:0x459a29 15:55:16 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) bind$ax25(r1, &(0x7f0000000200)={{0x3, @default}, [@null, @default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) [ 752.308791] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 752.327680] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 752.335376] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 752.342630] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 752.349883] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 752.357136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 752.364391] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x6, 0x0, 0x0) [ 752.397295] ISOFS: Unable to identify CD-ROM format. 15:55:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000000)={0x1, 0x6}) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:16 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x13}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:16 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x40c002, 0x0) fcntl$F_SET_FILE_RW_HINT(r6, 0x40e, &(0x7f0000000180)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') socket$nl_route(0x10, 0x3, 0x0) r7 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l\x1fsubdev#\x00', 0x27f11cc7, 0x101080) ioctl$VIDIOC_ENUMSTD(r7, 0xc0485619, &(0x7f00000000c0)={0xc30, 0x400000, "19d2a458ed673af2ab0f2bc83ac9967dbd52897a58df92ee", {0x2, 0x6}, 0x8001}) syz_kvm_setup_cpu$x86(r5, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) prctl$PR_SET_TIMERSLACK(0x1d, 0x2f7d29aa) 15:55:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xd9, 0x411000) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$GIO_FONTX(r7, 0x4b6b, &(0x7f0000000140)=""/221) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:16 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000)=0x200, &(0x7f0000000040)=0x2) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000000800010006080700418e00000004fcff", 0x58}], 0x1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r2, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x13be02dc09543987}, 0x4000040) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @default, @null, @null, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, 0x48) [ 752.638445] ISOFS: Unable to identify CD-ROM format. 15:55:16 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x7, 0x0, 0x0) 15:55:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 752.760635] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=43 sclass=netlink_tcpdiag_socket pig=27445 comm=syz-executor.5 [ 752.820879] FAULT_INJECTION: forcing a failure. [ 752.820879] name failslab, interval 1, probability 0, space 0, times 0 [ 752.832308] CPU: 1 PID: 27447 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 752.839235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.848588] Call Trace: [ 752.851181] dump_stack+0x172/0x1f0 [ 752.854815] should_fail.cold+0xa/0x1b [ 752.858704] ? do_syscall_64+0xfd/0x620 [ 752.862685] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 752.867795] ? find_held_lock+0x35/0x130 [ 752.871866] ? is_bpf_text_address+0xac/0x170 [ 752.876364] __should_failslab+0x121/0x190 [ 752.880614] should_failslab+0x9/0x14 [ 752.884407] kmem_cache_alloc_node_trace+0x5a/0x720 [ 752.889425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.894959] ? should_fail+0x14d/0x85c [ 752.898864] __kmalloc_node_track_caller+0x3d/0x80 [ 752.901118] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=43 sclass=netlink_tcpdiag_socket pig=27445 comm=syz-executor.5 [ 752.903798] __kmalloc_reserve.isra.0+0x40/0xf0 [ 752.903818] pskb_expand_head+0x154/0xe20 [ 752.920770] ? rcu_read_lock_sched_held+0x110/0x130 [ 752.920795] skb_ensure_writable+0x2ed/0x4a0 [ 752.920816] bpf_clone_redirect+0x141/0x480 [ 752.934380] bpf_prog_16657deb320fb2fe+0xf12/0x1000 [ 752.934406] ? mark_held_locks+0x100/0x100 [ 752.947943] ? bpf_test_run+0x71/0x430 [ 752.951843] ? find_held_lock+0x35/0x130 [ 752.955925] ? bpf_test_run+0x71/0x430 [ 752.959821] ? ktime_get+0x105/0x2f0 [ 752.963649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.969187] ? check_preemption_disabled+0x48/0x290 [ 752.974200] ? lock_acquire+0x16f/0x3f0 [ 752.978182] ? kasan_check_read+0x11/0x20 [ 752.982327] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 752.982346] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 752.982357] bpf_test_run+0x10d/0x430 [ 752.982380] bpf_prog_test_run_skb+0x64b/0xb20 [ 753.001432] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 753.006281] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 753.011821] ? fput+0x128/0x1a0 [ 753.015102] ? __bpf_prog_get+0x97/0x290 [ 753.015115] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 753.015131] bpf_prog_test_run+0x129/0x1a0 [ 753.015147] __x64_sys_bpf+0x397/0x4c0 [ 753.032134] ? bpf_prog_get+0x20/0x20 [ 753.035947] ? do_syscall_64+0x26/0x620 [ 753.040037] ? lockdep_hardirqs_on+0x415/0x5d0 [ 753.044616] ? trace_hardirqs_on+0x67/0x220 [ 753.048934] do_syscall_64+0xfd/0x620 [ 753.052743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.057934] RIP: 0033:0x459a29 15:55:17 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)={0x4, 0x2, 0x0, 0x6, 0x2, [{0x800000000000, 0x3, 0x3, 0x0, 0x0, 0x794884f58e6c6c41}, {0x400, 0x1, 0x1, 0x0, 0x0, 0x109}]}) syslog(0x3, &(0x7f00000000c0)=""/202, 0xca) bind$ax25(r0, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1}, [@null, @default, @null, @null, @bcast, @rose, @remote, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) accept4$bt_l2cap(r2, &(0x7f00000001c0), &(0x7f0000000280)=0xe, 0x0) 15:55:17 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x60}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 753.061121] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 753.061129] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 753.061145] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 753.061154] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 753.061162] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 753.061171] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 753.061178] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8, 0x0, 0x0) [ 753.178441] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:17 executing program 0 (fault-call:3 fault-nth:4): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:17 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xcb) getpeername$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@null, @remote, @remote, @bcast, @remote, @null, @rose, @default]}, &(0x7f0000000080)=0x48) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0xc00caee0, &(0x7f0000000180)={0x1e8c62ffe2000162, 0x0, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/57, 0x39}], 0x1}, 0x100) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 753.302687] FAULT_INJECTION: forcing a failure. [ 753.302687] name failslab, interval 1, probability 0, space 0, times 0 [ 753.314297] CPU: 0 PID: 27464 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 753.321230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.330590] Call Trace: [ 753.330614] dump_stack+0x172/0x1f0 [ 753.330638] should_fail.cold+0xa/0x1b [ 753.330656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 753.336846] ? depot_save_stack+0x1de/0x44f [ 753.350119] ? find_held_lock+0x35/0x130 [ 753.354196] __should_failslab+0x121/0x190 [ 753.358440] should_failslab+0x9/0x14 [ 753.362247] kmem_cache_alloc_node_trace+0x5a/0x720 [ 753.367258] ? __lock_acquire+0x6ee/0x49c0 [ 753.367273] ? lockdep_hardirqs_on+0x415/0x5d0 [ 753.376175] ? trace_hardirqs_on+0x67/0x220 [ 753.376197] __kmalloc_node_track_caller+0x3d/0x80 [ 753.376215] __kmalloc_reserve.isra.0+0x40/0xf0 [ 753.390106] pskb_expand_head+0x154/0xe20 [ 753.394253] ? save_stack+0x45/0xd0 [ 753.397879] ? kasan_kmalloc+0xce/0xf0 [ 753.397951] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 753.401778] ipgre_xmit+0x7d6/0xa80 [ 753.401802] dev_hard_start_xmit+0x1a5/0x980 [ 753.417260] ? check_preemption_disabled+0x48/0x290 [ 753.422302] __dev_queue_xmit+0x2704/0x2fe0 [ 753.426649] ? netdev_pick_tx+0x300/0x300 [ 753.430806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.436344] ? kasan_unpoison_shadow+0x35/0x50 [ 753.440939] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 753.445955] ? skb_release_data+0x144/0x7d0 [ 753.450276] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 753.455818] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 753.461360] ? kasan_check_write+0x14/0x20 [ 753.465596] ? pskb_expand_head+0x57a/0xe20 [ 753.469939] dev_queue_xmit+0x18/0x20 [ 753.473743] ? dev_queue_xmit+0x18/0x20 [ 753.477744] __bpf_redirect+0x74b/0xc10 [ 753.481735] bpf_clone_redirect+0x2dc/0x480 [ 753.486071] bpf_prog_16657deb320fb2fe+0x38a/0x1000 [ 753.491118] ? mark_held_locks+0x100/0x100 [ 753.495359] ? bpf_test_run+0x71/0x430 [ 753.499246] ? find_held_lock+0x35/0x130 [ 753.503309] ? bpf_test_run+0x71/0x430 [ 753.507215] ? ktime_get+0x105/0x2f0 [ 753.510939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.516480] ? check_preemption_disabled+0x48/0x290 [ 753.521492] ? lock_acquire+0x16f/0x3f0 [ 753.525461] ? kasan_check_read+0x11/0x20 [ 753.529634] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 753.534829] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 753.540360] bpf_test_run+0x10d/0x430 [ 753.544192] bpf_prog_test_run_skb+0x64b/0xb20 [ 753.548779] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 753.553633] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 753.559262] ? fput+0x128/0x1a0 [ 753.562545] ? __bpf_prog_get+0x97/0x290 [ 753.566606] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 753.571455] bpf_prog_test_run+0x129/0x1a0 [ 753.575697] __x64_sys_bpf+0x397/0x4c0 [ 753.579582] ? bpf_prog_get+0x20/0x20 [ 753.583393] ? do_syscall_64+0x26/0x620 [ 753.587371] ? lockdep_hardirqs_on+0x415/0x5d0 [ 753.591950] ? trace_hardirqs_on+0x67/0x220 [ 753.596280] do_syscall_64+0xfd/0x620 [ 753.600085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.605270] RIP: 0033:0x459a29 [ 753.608465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 753.627371] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 753.635085] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 753.642354] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a 15:55:17 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xf0}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 753.649622] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 753.656988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 753.664257] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x9, 0x0, 0x0) [ 753.809409] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setns(0xffffffffffffffff, 0x0) r4 = socket$rxrpc(0x21, 0x2, 0x2) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffc4b}, 0x48) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'hwsim0\x00', r6}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={r6, 0x1, 0x6, @remote}, 0x10) r7 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) ioctl$UI_SET_LEDBIT(r8, 0x40045569, 0x4) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r10 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x408104, 0x0) r11 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, r11, 0x4, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0xa8c0) sendmsg$NBD_CMD_CONNECT(r10, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x440c0}, 0x1000) setns(r9, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) connect$vsock_dgram(r9, &(0x7f0000000000)={0x28, 0x0, 0x2711, @reserved}, 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r12, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r13 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000480)="008106e358b6ebb35651", 0xa, 0xfffffffffffffffe) r14 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r13, r14, r13}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r15 = request_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000040)={0x3000, 0x2000}) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r15, 0x0) keyctl$KEYCTL_MOVE(0x1e, r13, r15, 0x0, 0x3) 15:55:18 executing program 0 (fault-call:3 fault-nth:5): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 754.001121] FAULT_INJECTION: forcing a failure. [ 754.001121] name failslab, interval 1, probability 0, space 0, times 0 [ 754.012719] CPU: 1 PID: 27485 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 754.019642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.019649] Call Trace: [ 754.019671] dump_stack+0x172/0x1f0 [ 754.019694] should_fail.cold+0xa/0x1b [ 754.039127] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 754.044325] ? kasan_check_read+0x11/0x20 [ 754.048494] __should_failslab+0x121/0x190 [ 754.052746] should_failslab+0x9/0x14 [ 754.056545] kmem_cache_alloc+0x47/0x700 [ 754.060608] ? __lock_is_held+0xb6/0x140 [ 754.064674] dst_alloc+0x10e/0x1d0 [ 754.068237] rt_dst_alloc+0x83/0x3f0 [ 754.071958] ip_route_output_key_hash_rcu+0x97d/0x30e0 [ 754.077261] ? ip_route_input_noref+0x280/0x280 [ 754.081933] ? kasan_check_read+0x11/0x20 [ 754.086074] ip_route_output_key_hash+0x212/0x380 [ 754.090911] ? ip_route_output_key_hash_rcu+0x30e0/0x30e0 [ 754.096442] ? bpf_prog_16657deb320fb2fe+0xf3/0x1000 [ 754.101525] ? bpf_test_run+0x10d/0x430 [ 754.105481] ? bpf_prog_test_run_skb+0x64b/0xb20 [ 754.110226] ? find_held_lock+0x35/0x130 [ 754.114275] ? debug_check_no_obj_freed+0x200/0x464 [ 754.119278] ip_route_output_flow+0x28/0xc0 [ 754.123595] ip_tunnel_xmit+0x6f6/0x353f [ 754.127654] ? ip_tunnel_init_net+0x9e0/0x9e0 [ 754.132133] ? skb_free_head+0x99/0xc0 [ 754.136000] ? kfree+0x170/0x220 [ 754.139349] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 754.143927] ? skb_free_head+0x99/0xc0 [ 754.147906] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 754.153439] __gre_xmit+0x5e1/0x9a0 [ 754.157060] ipgre_xmit+0x4f4/0xa80 [ 754.160673] dev_hard_start_xmit+0x1a5/0x980 [ 754.165085] ? check_preemption_disabled+0x48/0x290 [ 754.170090] __dev_queue_xmit+0x2704/0x2fe0 [ 754.174403] ? netdev_pick_tx+0x300/0x300 [ 754.178531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.184049] ? kasan_unpoison_shadow+0x35/0x50 [ 754.188626] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 754.193623] ? skb_release_data+0x144/0x7d0 [ 754.197927] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 754.203465] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 754.208983] ? kasan_check_write+0x14/0x20 [ 754.213217] ? pskb_expand_head+0x57a/0xe20 [ 754.217523] dev_queue_xmit+0x18/0x20 [ 754.221311] ? dev_queue_xmit+0x18/0x20 [ 754.225279] __bpf_redirect+0x74b/0xc10 [ 754.229242] bpf_clone_redirect+0x2dc/0x480 [ 754.233550] bpf_prog_16657deb320fb2fe+0xf3/0x1000 [ 754.238463] ? mark_held_locks+0x100/0x100 [ 754.242696] ? bpf_test_run+0x71/0x430 [ 754.246576] ? find_held_lock+0x35/0x130 [ 754.250624] ? bpf_test_run+0x71/0x430 [ 754.254506] ? ktime_get+0x105/0x2f0 [ 754.258211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.263730] ? check_preemption_disabled+0x48/0x290 [ 754.268728] ? lock_acquire+0x16f/0x3f0 [ 754.272687] ? kasan_check_read+0x11/0x20 [ 754.276826] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 754.282009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 754.287529] bpf_test_run+0x10d/0x430 [ 754.291327] bpf_prog_test_run_skb+0x64b/0xb20 [ 754.295900] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 754.300821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 754.306342] ? fput+0x128/0x1a0 [ 754.309607] ? __bpf_prog_get+0x97/0x290 [ 754.313651] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 754.318478] bpf_prog_test_run+0x129/0x1a0 [ 754.322735] __x64_sys_bpf+0x397/0x4c0 [ 754.326623] ? bpf_prog_get+0x20/0x20 [ 754.330427] ? do_syscall_64+0x26/0x620 [ 754.334488] ? lockdep_hardirqs_on+0x415/0x5d0 [ 754.339066] ? trace_hardirqs_on+0x67/0x220 [ 754.343373] do_syscall_64+0xfd/0x620 [ 754.347166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.352348] RIP: 0033:0x459a29 [ 754.355520] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 754.374397] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 754.382085] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 754.389329] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a 15:55:18 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xa00}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 754.396577] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 754.403827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 754.411078] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 [ 754.440743] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xa, 0x0, 0x0) 15:55:18 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 754.603331] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:18 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @default, 0x8}, [@null, @default, @bcast, @null, @default, @rose, @remote, @default]}, 0x48) [ 754.802593] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xb, 0x0, 0x0) 15:55:19 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @remote, @default]}, 0x48) 15:55:19 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xe00}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:19 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:19 executing program 0 (fault-call:3 fault-nth:6): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:19 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = socket(0x10, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000000c0)={r4}, &(0x7f0000000100)=0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockname$ax25(r1, &(0x7f0000000000)={{}, [@remote, @null, @default, @default, @rose, @null, @rose, @netrom]}, &(0x7f0000000080)=0x48) 15:55:19 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x1300}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xe, 0x0, 0x0) 15:55:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x12) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 755.357000] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 755.419491] FAULT_INJECTION: forcing a failure. [ 755.419491] name failslab, interval 1, probability 0, space 0, times 0 [ 755.430923] CPU: 1 PID: 27543 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 755.437854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.447203] Call Trace: [ 755.449838] dump_stack+0x172/0x1f0 [ 755.453484] should_fail.cold+0xa/0x1b [ 755.457376] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 755.462479] ? __lock_is_held+0xb6/0x140 [ 755.466569] __should_failslab+0x121/0x190 [ 755.470803] should_failslab+0x9/0x14 [ 755.474598] kmem_cache_alloc+0x47/0x700 [ 755.478657] ? finish_task_switch+0x146/0x780 [ 755.483155] skb_clone+0x156/0x3e0 [ 755.486699] bpf_clone_redirect+0xb2/0x480 [ 755.490941] bpf_prog_16657deb320fb2fe+0x964/0x1000 [ 755.495964] ? mark_held_locks+0x100/0x100 [ 755.500196] ? __schedule+0x86e/0x1dc0 [ 755.504083] ? find_held_lock+0x35/0x130 [ 755.508149] ? pci_mmcfg_check_reserved+0x170/0x170 [ 755.513169] ? bpf_test_run+0x146/0x430 [ 755.517155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.522697] ? check_preemption_disabled+0x48/0x290 [ 755.527707] ? lock_acquire+0x16f/0x3f0 [ 755.531688] ? kasan_check_read+0x11/0x20 [ 755.535838] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 755.541127] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 755.546659] bpf_test_run+0x10d/0x430 [ 755.550472] bpf_prog_test_run_skb+0x64b/0xb20 [ 755.555057] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 755.559895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 755.565444] ? fput+0x128/0x1a0 15:55:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x60042, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r6, 0x80605414, &(0x7f0000000040)=""/141) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 755.568734] ? __bpf_prog_get+0x97/0x290 [ 755.572795] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 755.577632] bpf_prog_test_run+0x129/0x1a0 [ 755.581868] __x64_sys_bpf+0x397/0x4c0 [ 755.585755] ? bpf_prog_get+0x20/0x20 [ 755.589561] ? do_syscall_64+0x26/0x620 [ 755.593545] ? lockdep_hardirqs_on+0x415/0x5d0 [ 755.598120] ? trace_hardirqs_on+0x67/0x220 [ 755.602445] do_syscall_64+0xfd/0x620 [ 755.606256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.611437] RIP: 0033:0x459a29 [ 755.611452] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.611458] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 755.641242] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 755.648514] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 755.648522] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 755.648530] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 755.648538] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:19 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x6000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:19 executing program 0 (fault-call:3 fault-nth:7): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 755.838606] FAULT_INJECTION: forcing a failure. [ 755.838606] name failslab, interval 1, probability 0, space 0, times 0 [ 755.850099] CPU: 1 PID: 27555 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 755.857023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.866368] Call Trace: [ 755.868954] dump_stack+0x172/0x1f0 [ 755.872583] should_fail.cold+0xa/0x1b [ 755.876487] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 755.881593] ? __lock_is_held+0xb6/0x140 [ 755.885662] __should_failslab+0x121/0x190 [ 755.889901] should_failslab+0x9/0x14 [ 755.893723] kmem_cache_alloc+0x47/0x700 [ 755.897791] ? finish_task_switch+0x146/0x780 [ 755.902284] skb_clone+0x156/0x3e0 [ 755.905828] bpf_clone_redirect+0xb2/0x480 [ 755.910086] bpf_prog_16657deb320fb2fe+0xba6/0x1000 [ 755.915110] ? mark_held_locks+0x100/0x100 [ 755.919343] ? __schedule+0x86e/0x1dc0 [ 755.923242] ? find_held_lock+0x35/0x130 [ 755.927302] ? pci_mmcfg_check_reserved+0x170/0x170 [ 755.932319] ? bpf_test_run+0x146/0x430 [ 755.936293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.941826] ? check_preemption_disabled+0x48/0x290 [ 755.946836] ? lock_acquire+0x16f/0x3f0 [ 755.950818] ? kasan_check_read+0x11/0x20 [ 755.954965] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 755.960155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 755.965701] bpf_test_run+0x10d/0x430 [ 755.969518] bpf_prog_test_run_skb+0x64b/0xb20 [ 755.974136] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 755.978981] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 755.984522] ? fput+0x128/0x1a0 15:55:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x10, 0x0, 0x0) [ 755.987807] ? __bpf_prog_get+0x97/0x290 [ 755.991863] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 755.996707] bpf_prog_test_run+0x129/0x1a0 [ 756.000948] __x64_sys_bpf+0x397/0x4c0 [ 756.004837] ? bpf_prog_get+0x20/0x20 [ 756.008659] ? do_syscall_64+0x26/0x620 [ 756.012628] ? lockdep_hardirqs_on+0x415/0x5d0 [ 756.017214] ? trace_hardirqs_on+0x67/0x220 [ 756.021551] do_syscall_64+0xfd/0x620 [ 756.021570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.030535] RIP: 0033:0x459a29 [ 756.033727] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 756.033736] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 756.033751] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 756.033763] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 756.074846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 756.082118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 15:55:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) ioctl$PPPIOCSMRU(r5, 0x40047452, &(0x7f0000000000)=0x6) [ 756.089377] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:20 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xf000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 756.174991] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) 15:55:20 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x46a, 0x440) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000040)={0x0, 0xa651}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x1a1) ioctl$sock_x25_SIOCDELRT(r5, 0x890c, &(0x7f0000000140)={@null=' \x00', 0xc, 'tunl0\x00'}) r6 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x11, 0x0, 0x0) 15:55:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r5, &(0x7f0000000000)={0x2, 0x2}, 0x2) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r7, 0x0) ioctl$KDENABIO(r7, 0x4b36) [ 756.394561] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000140)={0x1ff, 0xff, 0x6}) inotify_init1(0xc0c00) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000280)=""/65) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote, @default]}, 0x48) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000000000)={{0x1, 0x5, 0x7, 0xfd, 0x1f, 0x7f}, 0x94, 0x101, 0x8, 0x2, 0xf4, "8b1b62ab050000000400000043b35a6f6f05b16428864a440b9c0057ba520265f142ef312704fcc0beb45167fc182574e519595aa6b6929044eec6be2897032e0b4532bee0323f0000000000000002e4e0c07290040eb10300000000000000eff9ac244360e60f41e53776e28eabf0dca1e8b59774242ac9ca726247e5991d59"}) 15:55:20 executing program 0 (fault-call:3 fault-nth:8): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:20 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x8000a0}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)=""/94, 0x5e) 15:55:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) fdatasync(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x303300, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) recvfrom$unix(r4, &(0x7f0000000300)=""/4096, 0x1000, 0x20002181, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 15:55:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x21, 0x0, 0x0) 15:55:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x8) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 756.773013] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x7}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 756.857999] FAULT_INJECTION: forcing a failure. [ 756.857999] name failslab, interval 1, probability 0, space 0, times 0 [ 756.869239] CPU: 1 PID: 27611 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 756.876159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.885501] Call Trace: [ 756.888089] dump_stack+0x172/0x1f0 [ 756.891727] should_fail.cold+0xa/0x1b [ 756.895643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 756.900752] ? kasan_check_read+0x11/0x20 15:55:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum}) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 756.904919] __should_failslab+0x121/0x190 [ 756.909160] should_failslab+0x9/0x14 [ 756.912974] kmem_cache_alloc_node_trace+0x5a/0x720 [ 756.917992] ? __lock_acquire+0x6ee/0x49c0 [ 756.922231] ? unwind_get_return_address+0x61/0xa0 [ 756.927162] ? __save_stack_trace+0x99/0x100 [ 756.931575] __kmalloc_node_track_caller+0x3d/0x80 [ 756.936504] __kmalloc_reserve.isra.0+0x40/0xf0 [ 756.941180] pskb_expand_head+0x154/0xe20 [ 756.945331] ? save_stack+0x45/0xd0 [ 756.948954] ? kasan_kmalloc+0xce/0xf0 [ 756.952859] ipgre_xmit+0x7d6/0xa80 15:55:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0xcb) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$ax25_int(r0, 0x101, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 756.956502] dev_hard_start_xmit+0x1a5/0x980 [ 756.960919] ? check_preemption_disabled+0x48/0x290 [ 756.965946] __dev_queue_xmit+0x2704/0x2fe0 [ 756.970281] ? netdev_pick_tx+0x300/0x300 [ 756.974434] ? kasan_unpoison_shadow+0x35/0x50 [ 756.979023] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 756.984036] ? skb_release_data+0x144/0x7d0 [ 756.988349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 756.993878] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 756.999403] ? kasan_check_write+0x14/0x20 [ 757.003619] ? pskb_expand_head+0x57a/0xe20 [ 757.007927] dev_queue_xmit+0x18/0x20 [ 757.011709] ? dev_queue_xmit+0x18/0x20 [ 757.015662] __bpf_redirect+0x74b/0xc10 [ 757.019622] bpf_clone_redirect+0x2dc/0x480 [ 757.023932] bpf_prog_16657deb320fb2fe+0x38e/0x1000 [ 757.028939] ? mark_held_locks+0x100/0x100 [ 757.033159] ? bpf_test_run+0x71/0x430 [ 757.037029] ? find_held_lock+0x35/0x130 [ 757.041070] ? bpf_test_run+0x71/0x430 [ 757.044934] ? bpf_test_run+0x146/0x430 [ 757.048889] ? find_held_lock+0x35/0x130 [ 757.052929] ? bpf_test_run+0x146/0x430 [ 757.056889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.062405] ? check_preemption_disabled+0x48/0x290 [ 757.067400] ? lock_acquire+0x16f/0x3f0 [ 757.071360] ? kasan_check_read+0x11/0x20 [ 757.075501] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 757.080674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 757.086235] bpf_test_run+0x10d/0x430 [ 757.090032] bpf_prog_test_run_skb+0x64b/0xb20 [ 757.094604] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 757.099440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 757.104958] ? fput+0x128/0x1a0 [ 757.108221] ? __bpf_prog_get+0x97/0x290 [ 757.112264] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 757.117195] bpf_prog_test_run+0x129/0x1a0 [ 757.121413] __x64_sys_bpf+0x397/0x4c0 [ 757.125279] ? bpf_prog_get+0x20/0x20 [ 757.129064] ? do_syscall_64+0x26/0x620 [ 757.133036] ? lockdep_hardirqs_on+0x415/0x5d0 [ 757.137603] ? trace_hardirqs_on+0x67/0x220 [ 757.141925] do_syscall_64+0xfd/0x620 [ 757.145718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.150890] RIP: 0033:0x459a29 [ 757.154068] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.172950] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 757.180640] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 757.187886] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 757.195131] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:55:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xf00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 757.202380] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 757.209657] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:21 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x80ffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 757.301387] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:21 executing program 0 (fault-call:3 fault-nth:9): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x30, 0x0, 0x0) 15:55:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@dev, @in6=@ipv4={[], [], @dev}}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000000)={{0x78}, {0x5, 0x8}, 0xffff, 0x1, 0xb}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @rand_addr=0x7}, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e22, @multicast2}, 0x40, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)='hwsim0\x00', 0x7, 0x7, 0x5}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000080)={0x81, 0x7fff, 0x36eeba936d11abd1, 0x5ff8, 0x1, 0x101, 0x80, 0x1, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x4e22, 0x4, @loopback}}, 0x46, 0xa4}, 0x90) 15:55:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1100, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:21 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xf0ffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 757.622880] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40800, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @rose, @remote, @default]}, 0x48) 15:55:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4138ae84, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000240)=r7) r8 = syz_open_procfs(r7, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r8, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 757.774736] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 757.792780] FAULT_INJECTION: forcing a failure. [ 757.792780] name failslab, interval 1, probability 0, space 0, times 0 [ 757.804074] CPU: 1 PID: 27654 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 757.811009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.820359] Call Trace: 15:55:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x58, 0x0, 0x0) [ 757.822953] dump_stack+0x172/0x1f0 [ 757.826593] should_fail.cold+0xa/0x1b [ 757.830508] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 757.835609] ? __lock_is_held+0xb6/0x140 [ 757.839689] __should_failslab+0x121/0x190 [ 757.843935] should_failslab+0x9/0x14 [ 757.847740] kmem_cache_alloc+0x47/0x700 [ 757.851809] ? finish_task_switch+0x146/0x780 [ 757.856315] skb_clone+0x156/0x3e0 [ 757.859860] bpf_clone_redirect+0xb2/0x480 [ 757.864114] bpf_prog_16657deb320fb2fe+0xff2/0x1000 [ 757.869155] ? mark_held_locks+0x100/0x100 15:55:22 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x1000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 757.873394] ? __schedule+0x86e/0x1dc0 [ 757.877277] ? lockdep_hardirqs_on+0x415/0x5d0 [ 757.881865] ? pci_mmcfg_check_reserved+0x170/0x170 [ 757.886881] ? bpf_test_run+0x146/0x430 [ 757.890860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.896401] ? check_preemption_disabled+0x48/0x290 [ 757.901427] ? lock_acquire+0x16f/0x3f0 [ 757.905406] ? kasan_check_read+0x11/0x20 [ 757.909577] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 757.914767] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 757.920300] bpf_test_run+0x10d/0x430 [ 757.924106] bpf_prog_test_run_skb+0x64b/0xb20 [ 757.928712] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 757.933559] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 757.939096] ? fput+0x128/0x1a0 [ 757.942378] ? __bpf_prog_get+0x97/0x290 [ 757.946437] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 757.951284] bpf_prog_test_run+0x129/0x1a0 [ 757.955521] __x64_sys_bpf+0x397/0x4c0 [ 757.959414] ? bpf_prog_get+0x20/0x20 [ 757.963224] ? do_syscall_64+0x26/0x620 [ 757.967315] ? lockdep_hardirqs_on+0x415/0x5d0 [ 757.971903] ? trace_hardirqs_on+0x67/0x220 [ 757.976226] do_syscall_64+0xfd/0x620 [ 757.980028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.985218] RIP: 0033:0x459a29 [ 757.988419] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.007405] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 758.015115] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 15:55:22 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r4, r1, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) setns(0xffffffffffffffff, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000140)={0x1, 0x0, 0x2080, {0x0, 0x5000, 0x3}, [], "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", "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"}) [ 758.022381] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 758.029647] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 758.036908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 758.044176] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:22 executing program 0 (fault-call:3 fault-nth:10): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1300, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 758.179586] FAULT_INJECTION: forcing a failure. [ 758.179586] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 758.191423] CPU: 1 PID: 27671 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 758.198353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.207702] Call Trace: [ 758.210300] dump_stack+0x172/0x1f0 [ 758.213942] should_fail.cold+0xa/0x1b [ 758.217858] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.222961] ? mark_held_locks+0x100/0x100 [ 758.227195] ? find_held_lock+0x35/0x130 [ 758.231262] __alloc_pages_nodemask+0x1ee/0x750 [ 758.235931] ? is_bpf_text_address+0xac/0x170 [ 758.240429] ? __alloc_pages_slowpath+0x2870/0x2870 [ 758.245439] ? is_bpf_text_address+0xac/0x170 [ 758.249938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.255042] cache_grow_begin+0x91/0x8c0 [ 758.259104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.264645] ? check_preemption_disabled+0x48/0x290 [ 758.269683] kmem_cache_alloc_node_trace+0x655/0x720 [ 758.274792] ? __lock_acquire+0x6ee/0x49c0 [ 758.279023] ? unwind_get_return_address+0x61/0xa0 [ 758.283952] __kmalloc_node_track_caller+0x3d/0x80 [ 758.288884] __kmalloc_reserve.isra.0+0x40/0xf0 [ 758.293556] pskb_expand_head+0x154/0xe20 [ 758.297694] ? save_stack+0x45/0xd0 [ 758.301322] ? kasan_kmalloc+0xce/0xf0 [ 758.305231] ipgre_xmit+0x7d6/0xa80 [ 758.308867] dev_hard_start_xmit+0x1a5/0x980 [ 758.313281] ? check_preemption_disabled+0x48/0x290 [ 758.318314] __dev_queue_xmit+0x2704/0x2fe0 [ 758.322663] ? netdev_pick_tx+0x300/0x300 [ 758.326829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.332367] ? kasan_unpoison_shadow+0x35/0x50 [ 758.336956] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 758.341978] ? skb_release_data+0x144/0x7d0 [ 758.346321] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 758.351857] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 758.357412] ? kasan_check_write+0x14/0x20 [ 758.361658] ? pskb_expand_head+0x57a/0xe20 [ 758.365989] dev_queue_xmit+0x18/0x20 [ 758.369788] ? dev_queue_xmit+0x18/0x20 [ 758.373766] __bpf_redirect+0x74b/0xc10 [ 758.377749] bpf_clone_redirect+0x2dc/0x480 [ 758.382074] bpf_prog_16657deb320fb2fe+0x8e/0x1000 [ 758.387027] ? mark_held_locks+0x100/0x100 [ 758.391259] ? bpf_test_run+0x71/0x430 [ 758.395145] ? find_held_lock+0x35/0x130 [ 758.399201] ? bpf_test_run+0x71/0x430 [ 758.403101] ? bpf_test_run+0x146/0x430 [ 758.407073] ? find_held_lock+0x35/0x130 [ 758.411135] ? bpf_test_run+0x146/0x430 [ 758.415121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.420657] ? check_preemption_disabled+0x48/0x290 [ 758.425681] ? lock_acquire+0x16f/0x3f0 [ 758.429668] ? kasan_check_read+0x11/0x20 [ 758.433815] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 758.439004] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 758.444538] bpf_test_run+0x10d/0x430 [ 758.448349] bpf_prog_test_run_skb+0x64b/0xb20 [ 758.452937] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 758.457775] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 758.463318] ? fput+0x128/0x1a0 [ 758.466601] ? __bpf_prog_get+0x97/0x290 [ 758.470653] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 758.475494] bpf_prog_test_run+0x129/0x1a0 [ 758.479742] __x64_sys_bpf+0x397/0x4c0 [ 758.483633] ? bpf_prog_get+0x20/0x20 [ 758.487441] ? do_syscall_64+0x26/0x620 [ 758.491409] ? lockdep_hardirqs_on+0x415/0x5d0 [ 758.495990] ? trace_hardirqs_on+0x67/0x220 [ 758.500317] do_syscall_64+0xfd/0x620 [ 758.504120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.509316] RIP: 0033:0x459a29 [ 758.512509] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.531405] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 758.539198] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 758.546460] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 758.553720] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 758.561002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 758.568268] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:22 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x2000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:22 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) readahead(r1, 0x5, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000000)={0x20df8fce9bd0ec6f, 0x4}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 758.590301] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:22 executing program 0 (fault-call:3 fault-nth:11): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x60, 0x0, 0x0) [ 758.765188] FAULT_INJECTION: forcing a failure. [ 758.765188] name failslab, interval 1, probability 0, space 0, times 0 [ 758.776462] CPU: 1 PID: 27689 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 758.783385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.792735] Call Trace: [ 758.795345] dump_stack+0x172/0x1f0 [ 758.798976] should_fail.cold+0xa/0x1b [ 758.802868] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.808062] ? kasan_check_read+0x11/0x20 15:55:23 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x4000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 758.812221] __should_failslab+0x121/0x190 [ 758.816475] should_failslab+0x9/0x14 [ 758.820269] kmem_cache_alloc+0x47/0x700 [ 758.824350] ? __lock_is_held+0xb6/0x140 [ 758.828421] dst_alloc+0x10e/0x1d0 [ 758.831980] rt_dst_alloc+0x83/0x3f0 [ 758.835694] ip_route_output_key_hash_rcu+0x97d/0x30e0 [ 758.840973] ? ip_route_input_noref+0x280/0x280 [ 758.845634] ? kasan_check_read+0x11/0x20 [ 758.849784] ip_route_output_key_hash+0x212/0x380 [ 758.854637] ? ip_route_output_key_hash_rcu+0x30e0/0x30e0 [ 758.860184] ? bpf_prog_16657deb320fb2fe+0x78/0x1000 [ 758.865281] ? bpf_test_run+0x10d/0x430 [ 758.869260] ? bpf_prog_test_run_skb+0x64b/0xb20 [ 758.869279] ? find_held_lock+0x35/0x130 [ 758.869298] ? debug_check_no_obj_freed+0x200/0x464 [ 758.869318] ip_route_output_flow+0x28/0xc0 [ 758.869340] ip_tunnel_xmit+0x6f6/0x353f [ 758.869363] ? ip_tunnel_init_net+0x9e0/0x9e0 [ 758.895964] ? skb_free_head+0x99/0xc0 [ 758.899840] ? kfree+0x170/0x220 [ 758.903203] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 758.907789] ? skb_free_head+0x99/0xc0 [ 758.911679] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 758.917215] __gre_xmit+0x5e1/0x9a0 [ 758.920843] ipgre_xmit+0x4f4/0xa80 [ 758.924501] dev_hard_start_xmit+0x1a5/0x980 [ 758.928893] ? check_preemption_disabled+0x48/0x290 [ 758.933909] __dev_queue_xmit+0x2704/0x2fe0 [ 758.938217] ? netdev_pick_tx+0x300/0x300 [ 758.942345] ? kasan_unpoison_shadow+0x35/0x50 [ 758.946914] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 758.951923] ? skb_release_data+0x144/0x7d0 [ 758.956244] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 758.961765] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 758.967290] ? kasan_check_write+0x14/0x20 [ 758.971507] ? pskb_expand_head+0x57a/0xe20 [ 758.975820] dev_queue_xmit+0x18/0x20 [ 758.979631] ? dev_queue_xmit+0x18/0x20 [ 758.983601] __bpf_redirect+0x74b/0xc10 [ 758.987569] bpf_clone_redirect+0x2dc/0x480 [ 758.991879] bpf_prog_16657deb320fb2fe+0x78/0x1000 [ 758.996796] ? mark_held_locks+0x100/0x100 [ 759.001015] ? bpf_test_run+0x71/0x430 [ 759.004889] ? find_held_lock+0x35/0x130 [ 759.008933] ? bpf_test_run+0x71/0x430 [ 759.012804] ? bpf_test_run+0x146/0x430 [ 759.016763] ? find_held_lock+0x35/0x130 [ 759.020806] ? bpf_test_run+0x146/0x430 [ 759.024763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.030281] ? check_preemption_disabled+0x48/0x290 [ 759.035277] ? lock_acquire+0x16f/0x3f0 [ 759.039238] ? kasan_check_read+0x11/0x20 [ 759.043367] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 759.048545] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 759.054064] bpf_test_run+0x10d/0x430 [ 759.057858] bpf_prog_test_run_skb+0x64b/0xb20 [ 759.062434] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 759.067346] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 759.072863] ? fput+0x128/0x1a0 [ 759.076124] ? __bpf_prog_get+0x97/0x290 [ 759.080164] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 759.084987] bpf_prog_test_run+0x129/0x1a0 [ 759.089236] __x64_sys_bpf+0x397/0x4c0 [ 759.093106] ? bpf_prog_get+0x20/0x20 [ 759.096910] ? do_syscall_64+0x26/0x620 [ 759.100877] ? lockdep_hardirqs_on+0x415/0x5d0 [ 759.105444] ? trace_hardirqs_on+0x67/0x220 [ 759.109760] do_syscall_64+0xfd/0x620 [ 759.113554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.118728] RIP: 0033:0x459a29 [ 759.121904] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.140799] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 759.148497] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 759.155745] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a 15:55:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1400, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x20000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x5}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000000)) [ 759.162992] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 759.170331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 759.177601] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 [ 759.217792] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0x20, 0x0, 0x8, {0xfff, 0x0, 0x401, 0x3f}}, 0x20) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x64740, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1500, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfc, 0x0, 0x0) [ 759.397735] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4138ae84, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000240)=r4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mISDNtimer\x00', 0x200001, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) r19 = socket$nl_netfilter(0x10, 0x3, 0xc) r20 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r20, 0x0) r21 = ioctl$KVM_CREATE_VM(r20, 0xae01, 0x0) r22 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x7fff, 0x22481) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r24, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) r26 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) r28 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r30 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r30, 0x4138ae84, 0x0) fcntl$getownex(r30, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r29, 0x8902, &(0x7f0000000240)=r31) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe8) r33 = getpgid(0x0) r34 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r35, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r37 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r37, 0x4138ae84, 0x0) fcntl$getownex(r37, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r36, 0x8902, &(0x7f0000000240)=r38) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r40) r41 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r41, 0x0) ioctl$TIOCGPGRP(r41, 0x540f, &(0x7f0000000880)=0x0) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r44) sendmsg$unix(r1, &(0x7f0000000b40)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000080)="b5e4b351c3b30bbaf5d1e7f4e7902b32dbd6ef2a3af7db8aca6f4fe412f5b4ead1e633604fbfb13612e58f8ba852a53e75518ca422785a9a8b677496444dea1d35283b6a098daaff3045028587fc6496fa9809acd2ebb69b3a8a9f1b5d322ab97eb136e5c08ca2cefb3c1b98f3528062312af9457bae5a3973fdb8353acd84113c121740899f7679e48da6333798c74f2ac6f2950a25b8ac0dbb54e92ccc769bb09e5fb9803cf87968e83ff66e081ae419e795d9166f041420cfc1ac39266bf08844581aab56ae8a48c53cb50a6e20fa1d1efa5e1e55378805b6d0b9fc", 0xdd}, {&(0x7f0000000180)="c9aefb2578d0bbbabc1407a3ec114d1f1ba83689778e8d", 0x17}, {&(0x7f0000000280)="4f76ce79621abeaba851296b833f5aea040c346c880e90467df940425cb16680f7bf48d8cce1813b38b7958b6511c0f5af3cd93e86e5e3653a90c05fc7daf3783df918b6932273ebfc5f32276c62e4f8dc44febacf1cb1f47b1188c246f1d83f8476673b3760ccfa0f291939fc4efeaafdddf683a5", 0x75}, {&(0x7f0000000300)="85714ecac676f1f46c3313e81d0adb0a426d21c9c354860022cd45052f91578e0175b4b47ba59069f811d54a509e0237ab3c1b717a495bcdc8b828d27701e9155622f5a8419167165c46a0ff1a76764bab768fcc535684da1b8048816f0719dc2868c9ba631c69d98bc0bdd618", 0x6d}, {&(0x7f0000000380)="e316b077645d3fe36fa8d318cdaf49f0ed7c5e95e2069cbaf7bc61e3e7c46cd0677147511b31d3b858083774d6c7699ea31991f6c9ef565844555db70441007dd74755d501a0a38b54189396a6a17a3bc802a7e6edf1cb2926c9652d306d2a698d0fbb230dd459ca4dd2055a778cbf480394699457708b5a050a64d898840165453fc4947d3bc2bf336b07926d1237bc254920f5c4c7bd4e8f0fd3ab6e76aeeaced431ff00d85b817f1485b827935b67ae65e67b644fbbfb96661a302365ba92f80b035eb3", 0xc5}], 0x5, &(0x7f0000000980)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r7, @ANYRES32=r0, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32, @ANYRES32=r0, @ANYBLOB="0000000034000800000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r10, @ANYRES32=r0, @ANYRES32=r11, @ANYRES32=r0, @ANYRES32=r12, @ANYRES32=r0, @ANYBLOB="0000000034000000000000000100000007000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r0, @ANYRES32=r21, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r22, @ANYRES32=r23, @ANYRES32, @ANYRES32=r24, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r25, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r26, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r27, @ANYRES32=r28, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r31, @ANYRES32=r32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r33, @ANYRES32=r35, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r38, @ANYRES32=r39, @ANYRES32=r40, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r42, @ANYRES32=r43, @ANYRES32=r44, @ANYBLOB='\x00\x00\x00\x00'], 0x1a0, 0x4008490}, 0x20000000) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) 15:55:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x4, 0x3, 0xc10f, 0x7, 0x6, 0x40, 0x6, 0x2, 0x80, 0x6}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1600, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:23 executing program 0 (fault-call:3 fault-nth:12): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r2, 0x3ff}, 0x8) [ 759.660232] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 759.685947] FAULT_INJECTION: forcing a failure. [ 759.685947] name failslab, interval 1, probability 0, space 0, times 0 [ 759.697306] CPU: 1 PID: 27733 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 759.704232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.713577] Call Trace: [ 759.716175] dump_stack+0x172/0x1f0 [ 759.719786] should_fail.cold+0xa/0x1b [ 759.723677] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 759.728785] ? __lock_is_held+0xb6/0x140 [ 759.732838] __should_failslab+0x121/0x190 [ 759.737072] should_failslab+0x9/0x14 [ 759.740854] kmem_cache_alloc+0x47/0x700 [ 759.744923] ? finish_task_switch+0x146/0x780 [ 759.749401] skb_clone+0x156/0x3e0 [ 759.752925] bpf_clone_redirect+0xb2/0x480 [ 759.757154] bpf_prog_16657deb320fb2fe+0x850/0x1000 [ 759.762158] ? mark_held_locks+0x100/0x100 [ 759.766388] ? __schedule+0x86e/0x1dc0 [ 759.770264] ? find_held_lock+0x35/0x130 [ 759.774307] ? pci_mmcfg_check_reserved+0x170/0x170 [ 759.779306] ? bpf_test_run+0x146/0x430 [ 759.783283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.788817] ? check_preemption_disabled+0x48/0x290 [ 759.793830] ? lock_acquire+0x16f/0x3f0 [ 759.797791] ? kasan_check_read+0x11/0x20 [ 759.801931] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 759.807106] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 759.812630] bpf_test_run+0x10d/0x430 [ 759.816417] bpf_prog_test_run_skb+0x64b/0xb20 [ 759.820985] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 759.825810] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 759.831333] ? fput+0x128/0x1a0 [ 759.834606] ? __bpf_prog_get+0x97/0x290 [ 759.838656] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 759.843478] bpf_prog_test_run+0x129/0x1a0 [ 759.847697] __x64_sys_bpf+0x397/0x4c0 [ 759.851569] ? bpf_prog_get+0x20/0x20 [ 759.855362] ? do_syscall_64+0x26/0x620 [ 759.859330] ? lockdep_hardirqs_on+0x415/0x5d0 [ 759.863894] ? trace_hardirqs_on+0x67/0x220 [ 759.868221] do_syscall_64+0xfd/0x620 [ 759.872020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.877191] RIP: 0033:0x459a29 [ 759.880363] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.899253] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 759.906958] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 759.914211] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 759.921464] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 759.928721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 759.935997] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:24 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xa000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400040, 0x0) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @null}, [@remote, @netrom, @null, @null, @null, @default, @default, @null]}, &(0x7f00000000c0)=0x48) 15:55:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x103, 0x0, 0x0) 15:55:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1700, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000000)="84fed357ae2cc87988dce4cf41b95e309e4cdd22f11672a65eeda40e1ad8ba9f38bbf72f33988323dc5521a84a2dc87cea3ff57793f519fdbc59b3bbd7109e425cedcef7c1cf7487d8144320dcab4439926ef0153cd7b2cd860ce740abd8a2729bca254d559186e428e4391b11ae0037223ceba2ecaf6795225a0cc94f59") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x5}, [@bcast, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}, 0x48) [ 760.146503] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:24 executing program 0 (fault-call:3 fault-nth:13): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1800, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:24 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x4, 0xa200) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000140)=0x1, 0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400601, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0xff, 0x100820) write$P9_RAUTH(r2, &(0x7f00000001c0)={0x14, 0x67, 0x1, {0x40, 0x3, 0x5}}, 0x14) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000080)={0x9, 0x7ff, 0x6, 0x7, 0xe58, 0xca0c, 0xf2, 0x7ff, 0x547, 0x1, 0x7, 0x8, 0x1000, 0x5, &(0x7f0000000040)=""/54, 0x4, 0x10000000, 0xc97}) [ 760.301795] FAULT_INJECTION: forcing a failure. [ 760.301795] name failslab, interval 1, probability 0, space 0, times 0 [ 760.313088] CPU: 1 PID: 27757 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 760.320099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.329450] Call Trace: [ 760.332048] dump_stack+0x172/0x1f0 [ 760.335695] should_fail.cold+0xa/0x1b [ 760.339589] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.344699] ? kasan_check_read+0x11/0x20 [ 760.348857] __should_failslab+0x121/0x190 [ 760.353105] should_failslab+0x9/0x14 [ 760.356906] kmem_cache_alloc+0x47/0x700 [ 760.360973] ? __lock_is_held+0xb6/0x140 [ 760.365042] dst_alloc+0x10e/0x1d0 [ 760.368589] rt_dst_alloc+0x83/0x3f0 [ 760.372307] ip_route_output_key_hash_rcu+0x97d/0x30e0 [ 760.377596] ? ip_route_input_noref+0x280/0x280 [ 760.382275] ? kasan_check_read+0x11/0x20 [ 760.386450] ip_route_output_key_hash+0x212/0x380 [ 760.391301] ? ip_route_output_key_hash_rcu+0x30e0/0x30e0 [ 760.396839] ? bpf_prog_16657deb320fb2fe+0x3d7/0x1000 [ 760.402032] ? bpf_test_run+0x10d/0x430 [ 760.406009] ? bpf_prog_test_run_skb+0x64b/0xb20 [ 760.410771] ? find_held_lock+0x35/0x130 [ 760.414833] ? debug_check_no_obj_freed+0x200/0x464 [ 760.419857] ip_route_output_flow+0x28/0xc0 [ 760.424182] ip_tunnel_xmit+0x6f6/0x353f [ 760.428255] ? ip_tunnel_init_net+0x9e0/0x9e0 [ 760.432745] ? skb_free_head+0x99/0xc0 [ 760.436632] ? kfree+0x170/0x220 [ 760.439996] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 760.444582] ? skb_free_head+0x99/0xc0 15:55:24 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xe000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 760.448474] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 760.454016] __gre_xmit+0x5e1/0x9a0 [ 760.457660] ipgre_xmit+0x4f4/0xa80 [ 760.461308] dev_hard_start_xmit+0x1a5/0x980 [ 760.465720] ? check_preemption_disabled+0x48/0x290 [ 760.465739] __dev_queue_xmit+0x2704/0x2fe0 [ 760.465760] ? netdev_pick_tx+0x300/0x300 [ 760.479184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.484734] ? kasan_unpoison_shadow+0x35/0x50 [ 760.489322] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 760.494351] ? skb_release_data+0x144/0x7d0 [ 760.498681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.504221] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 760.509776] ? kasan_check_write+0x14/0x20 [ 760.514003] ? pskb_expand_head+0x57a/0xe20 [ 760.514021] dev_queue_xmit+0x18/0x20 [ 760.514034] ? dev_queue_xmit+0x18/0x20 [ 760.514049] __bpf_redirect+0x74b/0xc10 [ 760.514067] bpf_clone_redirect+0x2dc/0x480 [ 760.534382] bpf_prog_16657deb320fb2fe+0x3d7/0x1000 [ 760.539400] ? mark_held_locks+0x100/0x100 [ 760.539416] ? bpf_test_run+0x71/0x430 [ 760.539430] ? find_held_lock+0x35/0x130 [ 760.539444] ? bpf_test_run+0x71/0x430 [ 760.555452] ? bpf_test_run+0x146/0x430 [ 760.559421] ? find_held_lock+0x35/0x130 [ 760.559435] ? bpf_test_run+0x146/0x430 [ 760.559453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.559467] ? check_preemption_disabled+0x48/0x290 [ 760.559476] ? lock_acquire+0x16f/0x3f0 [ 760.559492] ? kasan_check_read+0x11/0x20 [ 760.559505] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 760.559520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 760.559529] bpf_test_run+0x10d/0x430 [ 760.559551] bpf_prog_test_run_skb+0x64b/0xb20 [ 760.605217] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 760.610059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 760.615615] ? fput+0x128/0x1a0 [ 760.615633] ? __bpf_prog_get+0x97/0x290 [ 760.615646] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 760.615663] bpf_prog_test_run+0x129/0x1a0 [ 760.615683] __x64_sys_bpf+0x397/0x4c0 [ 760.635895] ? bpf_prog_get+0x20/0x20 [ 760.635918] ? do_syscall_64+0x26/0x620 [ 760.635931] ? lockdep_hardirqs_on+0x415/0x5d0 [ 760.635947] ? trace_hardirqs_on+0x67/0x220 [ 760.635964] do_syscall_64+0xfd/0x620 [ 760.635981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.635993] RIP: 0033:0x459a29 [ 760.664718] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 760.683601] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 760.691295] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 760.698544] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 760.705805] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 760.713062] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 760.720315] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x1f4, 0x0, 0x0) 15:55:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000340), &(0x7f0000000380)=0x4) sendto$rxrpc(r1, &(0x7f0000000140)="d75f064d1b6859131e84d866e4d4f26dfaf8a713421142440b6a3c8acd5d01ae4b1f364219baab5f23b1c27875b7051c9417a278295daacd81ba5f4ef3c10086de813740e3a0286fc2075718838e158c8bbbf4e1260708195deb0d7e6304f6e49a0cdf0b4bc415734bd2bd1b89ab86ee88db9314046d9219c5f01e5ec1b1de21151793c1cd065a26bf39090fae3b381ad740677df196dd28273265cd2a45169e6eb0432acf6985bea34109ad28b190b2c455876e6fd6", 0xb6, 0x8000, &(0x7f0000000280)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0xe4, @mcast1, 0x4}}, 0x24) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f00000002c0)={@initdev, @local}, &(0x7f0000000300)=0x8) setns(r1, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x80000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r3, 0x5, 0x3, r4}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) [ 760.754707] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1900, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote, @bcast]}, 0x48) 15:55:25 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x13000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:25 executing program 4: modify_ldt$write(0x1, &(0x7f0000000080)={0x6, 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4db, 0x200000) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4, 0x8000, 0x7f}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r8, 0x4138ae84, 0x0) fcntl$getownex(r8, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r7, 0x8902, &(0x7f0000000240)=r9) r10 = syz_open_procfs(r9, &(0x7f0000000100)='ns/pid\x00') setns(r10, 0x0) ioctl$VHOST_SET_VRING_ADDR(r10, 0x4028af11, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000300)=""/4096, &(0x7f0000000140)=""/196, &(0x7f0000001300)=""/169, 0x103000}) [ 760.937710] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x7) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) ptrace$setregs(0x27e10a7c2dc2b30f, 0xffffffffffffffff, 0x0, &(0x7f0000000000)="0827e92bc88ed924beaf5128e0a42fd5385fca903c88c84bcf67eb6232c322916841557080a82373e799af87142a737cc8bc52a5fb84800748feaa15d3fcc54d58567a87474ee80625da757e5a6b965daeeb597af079206de47e0a96278f990a96e60718c775f51d534f1004c60f227b7db7ce1580c4c3af3292d45eba43ac2d3e277e97dfc63fa53b2906323fb96c24dc17ed12e75a416f3d03f96ecf346278a619050ca169a65ae437211b94963f472fe13c1afa7550e3e077272121454e53e6eda09ee42f108382b3b2712bbb2d3638d06357e2e9478ece2aa2") 15:55:25 executing program 0 (fault-call:3 fault-nth:14): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400340, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) write$vhci(r1, &(0x7f0000000140)=@HCI_EVENT_PKT={0x4, "015cc3306231a14bc6265001784a55c382eb58ec0d3926df0295058b751db9d9f2a1d2d8a5ee739ad5b2b9c29f524c5dd5bbceae205a106a8773ec00960ec0bd58c75e950fa9342aa5ebe7d4a3da9bdae888441e95d4e0fd11a304a092087cd11c2bda4f1166b82226a69d5c333b4b6d282a6dca7cb22b7477fd752d1b2799f5d930542752efbb9f9cf08ec669bc7f4574209b1de51440b490b31fb6c804320d814c1629c43d83005eefd64d0a484f611d3007aae149b1b4200ec80b440312b6928d7096c7802a03808840abf16be346d3aa4d8fc8e51e3f17948260782f39d5c4ce612a9eb1af86be0b31"}, 0xec) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r2, &(0x7f00000016c0), 0xa, 0x15316e87ae671e9f) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r4, &(0x7f0000001880)=""/63, 0x3f, 0x40010006, &(0x7f00000018c0)=@in={0x2, 0x4e23, @loopback}, 0x38f) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000001780)={0x0, 0x4}, &(0x7f00000017c0)=0x8) write$eventfd(0xffffffffffffffff, &(0x7f0000001940)=0xc1f0, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001800)={r5, 0x133}, &(0x7f0000001840)=0x8) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r9, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x300, 0x0, 0x0) [ 761.123154] FAULT_INJECTION: forcing a failure. [ 761.123154] name failslab, interval 1, probability 0, space 0, times 0 [ 761.134599] CPU: 1 PID: 27795 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 761.141525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.151004] Call Trace: [ 761.153597] dump_stack+0x172/0x1f0 [ 761.157231] should_fail.cold+0xa/0x1b [ 761.161132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.166238] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 761.171260] ? skb_release_data+0x144/0x7d0 [ 761.175586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.181135] __should_failslab+0x121/0x190 [ 761.185374] should_failslab+0x9/0x14 [ 761.189168] kmem_cache_alloc+0x47/0x700 [ 761.193228] ? __this_cpu_preempt_check+0x1d/0x30 [ 761.198067] skb_clone+0x156/0x3e0 [ 761.201651] bpf_clone_redirect+0xb2/0x480 [ 761.205909] bpf_prog_16657deb320fb2fe+0x143/0x1000 [ 761.210937] ? mark_held_locks+0x100/0x100 [ 761.215175] ? bpf_test_run+0x71/0x430 [ 761.219075] ? find_held_lock+0x35/0x130 [ 761.223147] ? bpf_test_run+0x71/0x430 [ 761.227031] ? bpf_test_run+0x146/0x430 [ 761.231008] ? find_held_lock+0x35/0x130 [ 761.235068] ? bpf_test_run+0x146/0x430 [ 761.239044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.244576] ? check_preemption_disabled+0x48/0x290 [ 761.249583] ? lock_acquire+0x16f/0x3f0 [ 761.253559] ? kasan_check_read+0x11/0x20 [ 761.257717] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 761.262918] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 761.268474] bpf_test_run+0x10d/0x430 [ 761.272289] bpf_prog_test_run_skb+0x64b/0xb20 [ 761.276886] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 761.281726] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 761.287265] ? fput+0x128/0x1a0 [ 761.290545] ? __bpf_prog_get+0x97/0x290 [ 761.294605] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 761.299457] bpf_prog_test_run+0x129/0x1a0 [ 761.303697] __x64_sys_bpf+0x397/0x4c0 [ 761.307588] ? bpf_prog_get+0x20/0x20 [ 761.311406] ? do_syscall_64+0x26/0x620 [ 761.315389] ? lockdep_hardirqs_on+0x415/0x5d0 [ 761.319986] ? trace_hardirqs_on+0x67/0x220 [ 761.324307] do_syscall_64+0xfd/0x620 [ 761.328118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.333310] RIP: 0033:0x459a29 [ 761.336499] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.355394] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 761.363101] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 15:55:25 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x60000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:25 executing program 5: socket$inet6(0xa, 0xc0008, 0x8) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = fcntl$dupfd(0xffffffffffffffff, 0xe09, r0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000080)={0xaf, 0x10}) open(&(0x7f0000000000)='./file0\x00', 0xa0440, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x6, 0x2a, 0x1200, 0x40, 0x101}) syz_init_net_socket$ax25(0x3, 0x2, 0x6) [ 761.370364] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 761.377627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 761.384899] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 761.392164] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 [ 761.432155] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:25 executing program 0 (fault-call:3 fault-nth:15): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x301, 0x0, 0x0) [ 761.643068] FAULT_INJECTION: forcing a failure. [ 761.643068] name failslab, interval 1, probability 0, space 0, times 0 [ 761.654462] CPU: 0 PID: 27812 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 761.661390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.670740] Call Trace: [ 761.673324] dump_stack+0x172/0x1f0 [ 761.676955] should_fail.cold+0xa/0x1b [ 761.680964] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.686071] ? kasan_check_read+0x11/0x20 [ 761.690313] __should_failslab+0x121/0x190 [ 761.694547] should_failslab+0x9/0x14 [ 761.698347] kmem_cache_alloc_node_trace+0x5a/0x720 [ 761.703374] ? __lock_acquire+0x6ee/0x49c0 [ 761.707607] ? unwind_get_return_address+0x61/0xa0 [ 761.712555] ? __save_stack_trace+0x99/0x100 [ 761.716987] __kmalloc_node_track_caller+0x3d/0x80 [ 761.721914] __kmalloc_reserve.isra.0+0x40/0xf0 [ 761.726585] pskb_expand_head+0x154/0xe20 [ 761.730744] ? save_stack+0x45/0xd0 [ 761.734368] ? kasan_kmalloc+0xce/0xf0 [ 761.738263] ipgre_xmit+0x7d6/0xa80 [ 761.741903] dev_hard_start_xmit+0x1a5/0x980 [ 761.746318] ? check_preemption_disabled+0x48/0x290 [ 761.751336] __dev_queue_xmit+0x2704/0x2fe0 [ 761.755663] ? netdev_pick_tx+0x300/0x300 [ 761.759803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.765335] ? kasan_unpoison_shadow+0x35/0x50 [ 761.769923] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 761.774938] ? skb_release_data+0x144/0x7d0 [ 761.779258] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.784794] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 761.790336] ? kasan_check_write+0x14/0x20 [ 761.794570] ? pskb_expand_head+0x57a/0xe20 [ 761.798896] dev_queue_xmit+0x18/0x20 [ 761.802695] ? dev_queue_xmit+0x18/0x20 [ 761.806673] __bpf_redirect+0x74b/0xc10 [ 761.810658] bpf_clone_redirect+0x2dc/0x480 [ 761.814998] bpf_prog_16657deb320fb2fe+0x709/0x1000 [ 761.820027] ? mark_held_locks+0x100/0x100 [ 761.824263] ? __schedule+0x86e/0x1dc0 [ 761.828149] ? find_held_lock+0x35/0x130 [ 761.832213] ? pci_mmcfg_check_reserved+0x170/0x170 [ 761.837230] ? bpf_test_run+0x146/0x430 [ 761.841214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.846748] ? check_preemption_disabled+0x48/0x290 [ 761.851757] ? lock_acquire+0x16f/0x3f0 [ 761.855743] ? kasan_check_read+0x11/0x20 [ 761.859975] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 761.865167] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 761.870722] bpf_test_run+0x10d/0x430 [ 761.874533] bpf_prog_test_run_skb+0x64b/0xb20 [ 761.879130] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 761.883969] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 761.889507] ? fput+0x128/0x1a0 [ 761.892790] ? __bpf_prog_get+0x97/0x290 [ 761.896849] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 761.901704] bpf_prog_test_run+0x129/0x1a0 [ 761.905940] __x64_sys_bpf+0x397/0x4c0 [ 761.909828] ? bpf_prog_get+0x20/0x20 [ 761.913635] ? do_syscall_64+0x26/0x620 [ 761.917607] ? lockdep_hardirqs_on+0x415/0x5d0 [ 761.922190] ? trace_hardirqs_on+0x67/0x220 [ 761.926528] do_syscall_64+0xfd/0x620 [ 761.930330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.935524] RIP: 0033:0x459a29 [ 761.938729] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.957626] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 761.965335] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 761.972610] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 761.979905] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 761.987181] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 15:55:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x202001, 0x0) accept4$netrom(r1, 0x0, &(0x7f00000002c0), 0x40000) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x14, r4, 0x200, 0x0, 0x25dfdbfe, {0x15}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8a00}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xf8, r4, 0x320, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffc00}]}, @TIPC_NLA_LINK={0xc8, 0x4, [@TIPC_NLA_LINK_NAME={0xe9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0xfffffffffffffe22, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0xffbe, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x0, 0x1, 'syz0\x00'}]}]}, 0xf8}}, 0x30024000) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:26 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xa0008000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 761.994451] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 [ 762.014029] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x40240) fchdir(r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:26 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) connect$ax25(r0, &(0x7f0000000000)={{0x3, @bcast, 0x9}, [@bcast, @default, @null, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 15:55:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2300, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x3e8, 0x0, 0x0) 15:55:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x2, 0x722}, 0xf) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') fsetxattr$trusted_overlay_origin(r4, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0xfffffffffffffeeb, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f00000001c0)={0x3}, 0x1) r6 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0xffff, 0x2000) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xfffffffffffffdc1) 15:55:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x20000, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18, 0xf, 0x1, {{0x4, 0x2, 0x1}, 0x1}}, 0x18) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x2e) [ 762.194290] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:26 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xffff8000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:26 executing program 0 (fault-call:3 fault-nth:16): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2c00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:26 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @bcast, 0x1}, [@bcast, @default, @bcast, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote, @default]}, 0x48) 15:55:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r6, 0xc1205531, &(0x7f0000000140)={0xfffffffd, 0x40, 0x4, 0x1, [], [], [], 0x0, 0x20, 0x9, 0x7, "0cb1fefdfacdb406671a2a591fa8aec1"}) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:26 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x500, 0x0, 0x0) 15:55:26 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xfffff000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:26 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup3(r1, r2, 0x40000) ioctl$BLKROSET(r3, 0x125d, &(0x7f0000000080)=0xfffffffffffffc00) semget$private(0x0, 0x3, 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="7412000000000000073a72afdf7111b3ba6b78de004d3f887307fc14c541c697be29ac9f32564585801dad39d0453602ac48d9b4c6e61e29b2529f98b88dd3980d3537fcddaf045899d2241ade39c91000000000000000000000000000000000000100040104000100c910ff010000000000000000000000000001c910ff020000000000000000000000000001c910fe8000000000000000000000000000aa0001000401000000000000"], 0xa0) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f00000000c0)={0x7, 0x5, 0x1}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r4, 0x101, 0x19, &(0x7f0000000040)=@bpq0='bpq0\x00', 0x10) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 762.526271] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 762.596878] FAULT_INJECTION: forcing a failure. [ 762.596878] name failslab, interval 1, probability 0, space 0, times 0 [ 762.608377] CPU: 0 PID: 27861 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 762.615306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.624665] Call Trace: [ 762.627255] dump_stack+0x172/0x1f0 [ 762.631006] should_fail.cold+0xa/0x1b [ 762.634897] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.640000] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 762.645014] ? skb_release_data+0x144/0x7d0 [ 762.649344] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.654893] __should_failslab+0x121/0x190 [ 762.659136] should_failslab+0x9/0x14 [ 762.662937] kmem_cache_alloc+0x47/0x700 [ 762.667019] ? __this_cpu_preempt_check+0x1d/0x30 [ 762.671875] skb_clone+0x156/0x3e0 [ 762.675419] bpf_clone_redirect+0xb2/0x480 [ 762.679668] bpf_prog_16657deb320fb2fe+0x664/0x1000 [ 762.684702] ? mark_held_locks+0x100/0x100 [ 762.688955] ? bpf_test_run+0x71/0x430 [ 762.692844] ? find_held_lock+0x35/0x130 [ 762.696903] ? bpf_test_run+0x71/0x430 [ 762.700788] ? bpf_test_run+0x146/0x430 [ 762.704766] ? find_held_lock+0x35/0x130 [ 762.708827] ? bpf_test_run+0x146/0x430 [ 762.712820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.718374] ? check_preemption_disabled+0x48/0x290 [ 762.723387] ? lock_acquire+0x16f/0x3f0 [ 762.727364] ? kasan_check_read+0x11/0x20 [ 762.731508] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 762.736698] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 762.742228] bpf_test_run+0x10d/0x430 [ 762.746063] bpf_prog_test_run_skb+0x64b/0xb20 [ 762.750669] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 762.755540] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 762.761079] ? fput+0x128/0x1a0 [ 762.764361] ? __bpf_prog_get+0x97/0x290 [ 762.768424] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 762.773270] bpf_prog_test_run+0x129/0x1a0 [ 762.777509] __x64_sys_bpf+0x397/0x4c0 [ 762.781402] ? bpf_prog_get+0x20/0x20 [ 762.785219] ? do_syscall_64+0x26/0x620 [ 762.789197] ? lockdep_hardirqs_on+0x415/0x5d0 [ 762.793782] ? trace_hardirqs_on+0x67/0x220 [ 762.798105] do_syscall_64+0xfd/0x620 [ 762.801911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.807093] RIP: 0033:0x459a29 [ 762.810282] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.829181] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 762.836892] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 762.844160] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 762.851429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 762.858693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 762.865976] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f0000000300)=""/4096) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:27 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x8000a0ffffffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:27 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000080)={0x0, 0x1}, 0x2) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @null, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x779536c16baf1069, 0x40) write$P9_RREADDIR(r2, &(0x7f0000000040)={0x2a, 0x29, 0x2, {0x0, [{{0x0, 0x2, 0x6}, 0x8001, 0x3f, 0x7, './file0'}]}}, 0x2a) 15:55:27 executing program 0 (fault-call:3 fault-nth:17): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x584, 0x0, 0x0) [ 763.062391] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 15:55:27 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10040, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000040)) bind$ax25(r0, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}, 0x48) [ 763.103131] FAULT_INJECTION: forcing a failure. [ 763.103131] name failslab, interval 1, probability 0, space 0, times 0 [ 763.114554] CPU: 1 PID: 27888 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 763.121487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.130855] Call Trace: [ 763.133454] dump_stack+0x172/0x1f0 [ 763.137088] should_fail.cold+0xa/0x1b [ 763.141070] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.146178] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 763.151214] ? skb_release_data+0x144/0x7d0 [ 763.155539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.161079] __should_failslab+0x121/0x190 [ 763.165316] should_failslab+0x9/0x14 [ 763.169131] kmem_cache_alloc+0x47/0x700 [ 763.173194] ? __this_cpu_preempt_check+0x1d/0x30 [ 763.178156] skb_clone+0x156/0x3e0 [ 763.181703] bpf_clone_redirect+0xb2/0x480 [ 763.185959] bpf_prog_16657deb320fb2fe+0x826/0x1000 [ 763.190992] ? mark_held_locks+0x100/0x100 [ 763.195232] ? bpf_test_run+0x71/0x430 [ 763.199122] ? find_held_lock+0x35/0x130 15:55:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="012d9e00", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000000)={r6, 0x7}, &(0x7f0000000040)=0x8) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 763.203190] ? bpf_test_run+0x71/0x430 [ 763.207084] ? bpf_test_run+0x146/0x430 [ 763.211188] ? find_held_lock+0x35/0x130 [ 763.215255] ? bpf_test_run+0x146/0x430 [ 763.219244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.224790] ? check_preemption_disabled+0x48/0x290 [ 763.229826] ? lock_acquire+0x16f/0x3f0 [ 763.233822] ? kasan_check_read+0x11/0x20 [ 763.237974] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 763.243189] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.248730] bpf_test_run+0x10d/0x430 15:55:27 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x80ffff00000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 763.252567] bpf_prog_test_run_skb+0x64b/0xb20 [ 763.257164] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 763.262016] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.267565] ? fput+0x128/0x1a0 [ 763.270848] ? __bpf_prog_get+0x97/0x290 [ 763.274917] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 763.279761] bpf_prog_test_run+0x129/0x1a0 [ 763.283985] __x64_sys_bpf+0x397/0x4c0 [ 763.287860] ? bpf_prog_get+0x20/0x20 [ 763.291651] ? do_syscall_64+0x26/0x620 [ 763.295618] ? lockdep_hardirqs_on+0x415/0x5d0 [ 763.300186] ? trace_hardirqs_on+0x67/0x220 [ 763.304505] do_syscall_64+0xfd/0x620 [ 763.308296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.313484] RIP: 0033:0x459a29 [ 763.316659] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.335540] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 763.343250] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 763.350499] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 763.357756] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 763.365008] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 763.372271] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:27 executing program 0 (fault-call:3 fault-nth:18): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 763.518563] FAULT_INJECTION: forcing a failure. [ 763.518563] name failslab, interval 1, probability 0, space 0, times 0 [ 763.529874] CPU: 0 PID: 27899 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 763.529881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.529909] Call Trace: [ 763.548772] dump_stack+0x172/0x1f0 [ 763.552401] should_fail.cold+0xa/0x1b [ 763.556283] ? do_syscall_64+0xfd/0x620 [ 763.560258] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.565368] ? __dev_queue_xmit+0x1757/0x2fe0 [ 763.569866] ? __local_bh_enable_ip+0x15a/0x270 [ 763.574540] __should_failslab+0x121/0x190 [ 763.578778] should_failslab+0x9/0x14 [ 763.582582] kmem_cache_alloc_node_trace+0x5a/0x720 [ 763.587601] ? netdev_pick_tx+0x300/0x300 [ 763.591777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.597331] ? should_fail+0x14d/0x85c [ 763.601228] __kmalloc_node_track_caller+0x3d/0x80 [ 763.606168] __kmalloc_reserve.isra.0+0x40/0xf0 [ 763.610845] pskb_expand_head+0x154/0xe20 [ 763.614990] ? rcu_read_lock_sched_held+0x110/0x130 [ 763.615025] skb_ensure_writable+0x2ed/0x4a0 [ 763.615043] bpf_clone_redirect+0x141/0x480 [ 763.628749] bpf_prog_16657deb320fb2fe+0x147/0x1000 [ 763.628772] ? mark_held_locks+0x100/0x100 [ 763.636640] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 763.638003] ? bpf_test_run+0x71/0x430 [ 763.638021] ? find_held_lock+0x35/0x130 [ 763.638037] ? bpf_test_run+0x71/0x430 [ 763.649247] ? bpf_test_run+0x146/0x430 [ 763.649263] ? find_held_lock+0x35/0x130 [ 763.649300] ? bpf_test_run+0x146/0x430 [ 763.657218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.657234] ? check_preemption_disabled+0x48/0x290 [ 763.657245] ? lock_acquire+0x16f/0x3f0 [ 763.657267] ? kasan_check_read+0x11/0x20 [ 763.687816] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 763.693007] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.698540] bpf_test_run+0x10d/0x430 [ 763.702353] bpf_prog_test_run_skb+0x64b/0xb20 [ 763.706944] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 763.711794] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.717330] ? fput+0x128/0x1a0 [ 763.720606] ? __bpf_prog_get+0x97/0x290 [ 763.724671] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 763.729516] bpf_prog_test_run+0x129/0x1a0 [ 763.733749] __x64_sys_bpf+0x397/0x4c0 [ 763.737630] ? bpf_prog_get+0x20/0x20 [ 763.741435] ? do_syscall_64+0x26/0x620 [ 763.745412] ? lockdep_hardirqs_on+0x415/0x5d0 [ 763.749992] ? trace_hardirqs_on+0x67/0x220 [ 763.754313] do_syscall_64+0xfd/0x620 [ 763.758132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.763318] RIP: 0033:0x459a29 [ 763.766511] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.785406] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 763.793110] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 763.800371] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 763.807632] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:55:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:28 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xf0ffffffffffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setpriority(0x9ccd4348d2cbfc9e, 0x0, 0x4) bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 763.814890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 763.822151] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x5ac, 0x0, 0x0) 15:55:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:28 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r1) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x3c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000280)={0xc9, "0017af8edb9f254013b77bdcd1d0cbe21621729f1d8068c4cc140d27fb92c1783f6254561b9b7229c12d6b9f0209d794bc5d7d51bd5f0019a56036f3f7935921f2aa49527b797b39a841a4ea0e106265369edf2dcc5da600f9719dcde0a380839c0bdc55fffb748f5d037c8d878c553b11f23418badb7874b8871970a6be80ec7febdcd84d505090a09d5f1305a3335cb0e077cad233b542b367026781b87308f4e14a242e2befd5600ea19be4a4b021880df027599be02ee25a57d5286e015ef24f2c573a031bf5cb"}) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) 15:55:28 executing program 0 (fault-call:3 fault-nth:19): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 763.991879] isofs_fill_super: bread failed, dev=loop3, iso_blknum=30, block=60 [ 764.065789] FAULT_INJECTION: forcing a failure. [ 764.065789] name failslab, interval 1, probability 0, space 0, times 0 [ 764.077192] CPU: 1 PID: 27924 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 764.084123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.093477] Call Trace: [ 764.096072] dump_stack+0x172/0x1f0 [ 764.099718] should_fail.cold+0xa/0x1b [ 764.103611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.108725] ? kasan_check_read+0x11/0x20 [ 764.112886] __should_failslab+0x121/0x190 [ 764.117132] should_failslab+0x9/0x14 [ 764.120939] kmem_cache_alloc_node_trace+0x5a/0x720 [ 764.125958] ? __lock_acquire+0x6ee/0x49c0 [ 764.130193] ? unwind_get_return_address+0x61/0xa0 [ 764.135133] ? __save_stack_trace+0x99/0x100 [ 764.139566] __kmalloc_node_track_caller+0x3d/0x80 [ 764.144506] __kmalloc_reserve.isra.0+0x40/0xf0 [ 764.149187] pskb_expand_head+0x154/0xe20 [ 764.153336] ? save_stack+0x45/0xd0 [ 764.156962] ? kasan_kmalloc+0xce/0xf0 [ 764.160871] ipgre_xmit+0x7d6/0xa80 15:55:28 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000001c0)=0x9, 0x4) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x4001}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) [ 764.164513] dev_hard_start_xmit+0x1a5/0x980 [ 764.168925] ? check_preemption_disabled+0x48/0x290 [ 764.173944] __dev_queue_xmit+0x2704/0x2fe0 [ 764.178275] ? netdev_pick_tx+0x300/0x300 [ 764.182420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.187952] ? kasan_unpoison_shadow+0x35/0x50 [ 764.192537] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 764.197568] ? skb_release_data+0x144/0x7d0 [ 764.201892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.207433] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 764.212976] ? kasan_check_write+0x14/0x20 [ 764.217212] ? pskb_expand_head+0x57a/0xe20 [ 764.221559] dev_queue_xmit+0x18/0x20 [ 764.225359] ? dev_queue_xmit+0x18/0x20 [ 764.229343] __bpf_redirect+0x74b/0xc10 [ 764.233325] bpf_clone_redirect+0x2dc/0x480 [ 764.237655] bpf_prog_16657deb320fb2fe+0x3b5/0x1000 [ 764.242680] ? mark_held_locks+0x100/0x100 [ 764.246914] ? bpf_test_run+0x71/0x430 [ 764.250799] ? find_held_lock+0x35/0x130 [ 764.254859] ? bpf_test_run+0x71/0x430 [ 764.258753] ? bpf_test_run+0x146/0x430 [ 764.262734] ? find_held_lock+0x35/0x130 [ 764.266798] ? bpf_test_run+0x146/0x430 [ 764.270786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.276328] ? check_preemption_disabled+0x48/0x290 [ 764.281349] ? lock_acquire+0x16f/0x3f0 [ 764.285317] ? kasan_check_read+0x11/0x20 [ 764.285332] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 764.285347] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 764.294639] bpf_test_run+0x10d/0x430 [ 764.294664] bpf_prog_test_run_skb+0x64b/0xb20 [ 764.294684] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 764.294694] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 764.294708] ? fput+0x128/0x1a0 [ 764.322167] ? __bpf_prog_get+0x97/0x290 [ 764.326211] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 764.331038] bpf_prog_test_run+0x129/0x1a0 [ 764.335261] __x64_sys_bpf+0x397/0x4c0 [ 764.339126] ? bpf_prog_get+0x20/0x20 [ 764.342914] ? do_syscall_64+0x26/0x620 [ 764.346869] ? lockdep_hardirqs_on+0x415/0x5d0 [ 764.351436] ? trace_hardirqs_on+0x67/0x220 [ 764.355742] do_syscall_64+0xfd/0x620 [ 764.359529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.364696] RIP: 0033:0x459a29 [ 764.367870] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.386846] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 764.394532] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 764.401800] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 764.409064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 764.416315] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 764.423584] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xff0f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:28 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x73, "661da7722fabadf65f26b5075e8ba60e7edb5687217d019f93f02d1264c34046453e84affe1c9ca87c2fd665243bb8e82fc3fe971a7c1bb8d6c948b7ff9323a0b35ad2b5c38ed6d745dc8408da3e055a8025e6b350333d1a1f703ed5559fa2f52fe82c59f1611832086226277b7bccb8a74cf2"}, &(0x7f0000000280)=0x97) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000140)={0x90, 0x0, 0x6, {0x4, 0x2, 0x1, 0x7f, 0x4a0, 0xfff, {0x4, 0x7, 0xf73b, 0x3, 0x8, 0x1c000, 0x10001, 0x1, 0x1, 0xbb42, 0x5, r2, r3, 0x8, 0x5}}}, 0x90) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x0, 0x8000) ioctl$RTC_WKALM_RD(r9, 0x80287010, &(0x7f0000000240)) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r10, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 764.576298] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 15:55:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x600, 0x0, 0x0) 15:55:28 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x100000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:28 executing program 5: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x4}, [@null, @default, @bcast, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x800, 0x2000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000040)={0xffff, 0x100000001, 0x4}) 15:55:28 executing program 0 (fault-call:3 fault-nth:20): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:28 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000100)="57f2b8b61662c082cd94de87d0af1d57ff06ef748ee6fd167e4b816c64b0a835004a0f05ab25d46442dd701fd6118538f11adbfcc8ab6a32306223e0545f7929b9e6c7ed43abba07032eec818d772b266d1873211b75fa6c0b9570932f60356b01f1e8523de90de046dc8127a2af3c6a0ea1f38f5917f4d001979ace575a8b0e5f03084473cefe3e7eba", 0x8a) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, r1) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000000)={0x85, 0x3e29af80, 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x1000, &(0x7f0000001280)=""/4096, 0xc2, &(0x7f0000002280)=""/194}) r2 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) bind$ax25(r2, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000040)={0x9}) 15:55:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r2, &(0x7f0000000000)) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 764.792346] ISOFS: Unable to identify CD-ROM format. 15:55:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1fffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x700, 0x0, 0x0) 15:55:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tee(r2, r3, 0x3ff, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:29 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x200000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:29 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x379) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) [ 764.988879] ISOFS: Unable to identify CD-ROM format. [ 765.062528] FAULT_INJECTION: forcing a failure. [ 765.062528] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 765.074368] CPU: 0 PID: 27974 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 765.081294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.090665] Call Trace: [ 765.093279] dump_stack+0x172/0x1f0 [ 765.096921] should_fail.cold+0xa/0x1b [ 765.100815] ? unwind_get_return_address+0x61/0xa0 [ 765.105753] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.110875] __alloc_pages_nodemask+0x1ee/0x750 [ 765.115554] ? save_stack+0xa9/0xd0 [ 765.119200] ? __alloc_pages_slowpath+0x2870/0x2870 [ 765.124219] ? kmem_cache_alloc+0x12e/0x700 [ 765.128541] ? skb_clone+0x156/0x3e0 [ 765.132252] ? bpf_clone_redirect+0xb2/0x480 [ 765.136656] ? do_syscall_64+0xfd/0x620 [ 765.140633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.146002] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.151121] cache_grow_begin+0x91/0x8c0 [ 765.155186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.160738] ? check_preemption_disabled+0x48/0x290 [ 765.165776] kmem_cache_alloc_node_trace+0x655/0x720 [ 765.170888] __kmalloc_node_track_caller+0x3d/0x80 [ 765.175817] __kmalloc_reserve.isra.0+0x40/0xf0 [ 765.180496] pskb_expand_head+0x154/0xe20 [ 765.184642] ? rcu_read_lock_sched_held+0x110/0x130 [ 765.189673] skb_ensure_writable+0x2ed/0x4a0 [ 765.194092] bpf_clone_redirect+0x141/0x480 [ 765.198421] bpf_prog_16657deb320fb2fe+0xf0/0x1000 [ 765.203379] ? mark_held_locks+0x100/0x100 [ 765.207615] ? __schedule+0x86e/0x1dc0 [ 765.211503] ? find_held_lock+0x35/0x130 [ 765.215567] ? pci_mmcfg_check_reserved+0x170/0x170 [ 765.220585] ? bpf_test_run+0x146/0x430 [ 765.224562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.230093] ? check_preemption_disabled+0x48/0x290 [ 765.235104] ? lock_acquire+0x16f/0x3f0 [ 765.239259] ? kasan_check_read+0x11/0x20 [ 765.243410] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 765.248600] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 765.254130] bpf_test_run+0x10d/0x430 [ 765.257943] bpf_prog_test_run_skb+0x64b/0xb20 [ 765.262530] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 765.267369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 765.272908] ? fput+0x128/0x1a0 [ 765.276190] ? __bpf_prog_get+0x97/0x290 [ 765.280250] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 765.285098] bpf_prog_test_run+0x129/0x1a0 [ 765.289335] __x64_sys_bpf+0x397/0x4c0 [ 765.293223] ? bpf_prog_get+0x20/0x20 [ 765.297039] ? do_syscall_64+0x26/0x620 [ 765.301016] ? lockdep_hardirqs_on+0x415/0x5d0 [ 765.305597] ? trace_hardirqs_on+0x67/0x220 [ 765.309921] do_syscall_64+0xfd/0x620 [ 765.313721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.318907] RIP: 0033:0x459a29 [ 765.322102] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.341123] RSP: 002b:00007fb10baecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 765.348863] RAX: ffffffffffffffda RBX: 00007fb10baecc90 RCX: 0000000000459a29 [ 765.356134] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a 15:55:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 765.363397] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 765.370660] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10baed6d4 [ 765.377949] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000004 15:55:29 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x400000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:29 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000080)={0x3, @null, r2}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f00000000c0)={{0x80, 0x7, 0x3, 0x9, 0x2, 0x1}, 0xfffffffa, 0x6, 0x45}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 765.477800] ISOFS: Unable to identify CD-ROM format. 15:55:29 executing program 0 (fault-call:3 fault-nth:21): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x900, 0x0, 0x0) 15:55:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x6, 0x10552f5dcd742130) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r7, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={r8, @in6={{0xa, 0x4e24, 0xd, @rand_addr="d898ba613347521296a6d558880ce88d", 0x3f}}, 0x5, 0x200, 0x3, 0x40, 0x56}, 0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=r9, @ANYBLOB="df000000bed187ca6bdf376ebaa1796ee5909de334b13a8a03c6c7fb9da8986b856409d228a43e9c7bbf1e069e8607ded24e5f3ab3ebe17b949c84094e075fe839b3e3b91302f28b3fed1d8a627469c5389526c430e7536e4aee9efc68a8d55bc3545c439130795b0d3c327ddab98372d06c18dd1ab49017435e1bc130d30941d008c68a19c089eaf2b41c0f50f7df0a86bab643a625d750694a4a546be652578054ac6d9ff9cf1a48ee45b6888046b702a48249514a524da3aaff6358e01b50bb6abd0ee3edb9dff5362a87db77ef93a324f8df9d241500"/227], &(0x7f0000000240)=0xe7) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000280)={r10}, &(0x7f0000000300)=0x8) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r11, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:29 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) inotify_init1(0x80800) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:29 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xa00000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 765.877622] FAULT_INJECTION: forcing a failure. [ 765.877622] name failslab, interval 1, probability 0, space 0, times 0 [ 765.889175] CPU: 0 PID: 28003 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 765.896145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.905538] Call Trace: [ 765.905560] dump_stack+0x172/0x1f0 [ 765.905581] should_fail.cold+0xa/0x1b [ 765.905595] ? do_syscall_64+0xfd/0x620 [ 765.905612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.919645] ? __dev_queue_xmit+0x1757/0x2fe0 [ 765.919666] ? __local_bh_enable_ip+0x15a/0x270 [ 765.919689] __should_failslab+0x121/0x190 [ 765.929261] should_failslab+0x9/0x14 [ 765.929276] kmem_cache_alloc_node_trace+0x5a/0x720 [ 765.929291] ? netdev_pick_tx+0x300/0x300 [ 765.951108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.956662] ? should_fail+0x14d/0x85c [ 765.960556] __kmalloc_node_track_caller+0x3d/0x80 [ 765.965507] __kmalloc_reserve.isra.0+0x40/0xf0 [ 765.970180] pskb_expand_head+0x154/0xe20 [ 765.974322] ? rcu_read_lock_sched_held+0x110/0x130 [ 765.979350] skb_ensure_writable+0x2ed/0x4a0 [ 765.983782] bpf_clone_redirect+0x141/0x480 [ 765.988129] bpf_prog_16657deb320fb2fe+0x131/0x1000 [ 765.993159] ? mark_held_locks+0x100/0x100 [ 765.997396] ? bpf_test_run+0x71/0x430 [ 766.001286] ? find_held_lock+0x35/0x130 [ 766.005346] ? bpf_test_run+0x71/0x430 [ 766.009230] ? bpf_test_run+0x146/0x430 [ 766.013205] ? find_held_lock+0x35/0x130 [ 766.017352] ? bpf_test_run+0x146/0x430 [ 766.021333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.026870] ? check_preemption_disabled+0x48/0x290 [ 766.031884] ? lock_acquire+0x16f/0x3f0 [ 766.035874] ? kasan_check_read+0x11/0x20 [ 766.040021] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 766.045227] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 766.050792] bpf_test_run+0x10d/0x430 [ 766.054601] bpf_prog_test_run_skb+0x64b/0xb20 [ 766.059188] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 766.064028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 766.069565] ? fput+0x128/0x1a0 [ 766.072842] ? __bpf_prog_get+0x97/0x290 [ 766.076898] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 766.081738] bpf_prog_test_run+0x129/0x1a0 [ 766.085978] __x64_sys_bpf+0x397/0x4c0 [ 766.089880] ? bpf_prog_get+0x20/0x20 [ 766.093691] ? do_syscall_64+0x26/0x620 [ 766.097661] ? lockdep_hardirqs_on+0x415/0x5d0 [ 766.102241] ? trace_hardirqs_on+0x67/0x220 [ 766.106566] do_syscall_64+0xfd/0x620 [ 766.110372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.115558] RIP: 0033:0x459a29 [ 766.118765] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.137661] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 766.145370] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 766.152644] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 766.159910] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 766.167262] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 15:55:30 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xe00000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:30 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair(0x3, 0xa, 0xe8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000100)={0x3, @bcast, r2}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bpq0\x00', {0x2, 0x4e23, @multicast2}}) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=""/82, &(0x7f00000001c0)=0x52) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) mount$9p_rdma(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x16402, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@common=@dfltuid={'dfltuid', 0x3d, r5}}, {@common=@posixacl='posixacl'}, {@timeout={'timeout'}}, {@sq={'sq', 0x3d, 0x9}}, {@sq={'sq', 0x3d, 0x8}}, {@timeout={'timeout', 0x3d, 0x10000}}, {@sq={'sq', 0x3d, 0x1}}, {@rq={'rq', 0x3d, 0x100000000}}]}}) 15:55:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000480)={0x6, 0x18002, 0x5, 0x5, 0x0}, &(0x7f00000004c0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000500)={r7, 0x7}, 0x8) r8 = getuid() syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x7ff, 0x5, &(0x7f0000000340)=[{&(0x7f0000000140)="492149fef3f868b9c4e638fc72161f96d5a718171dbd74d095cae62f5b135f52ee15dd25a7e772c2a267413ef8d09276c77753f566f5c572cfc5135dabd99625b0ea0e5aa0c7097b0905fc188018639f2a73d8661ca11140afc919ebe90b8bf699f5c4947baa3ff451daa395cc3e7ff73545a05e90d61cc90dcb7edefd942fa2b1dc65e27879c6fdd581", 0x8a, 0x6}, {&(0x7f0000000200)="509861ebc12738a1a0bef50700320a7a221dc625bc3956b98d8ea7c166f54d426e961bcb5e14324c156b063796b4cc3a295e858486eddbf000cd6fb4f44be32745c4acf5b61cc07100e643ac4a07f12184ea75f9fea52cbafb83a307fd7a034f15f166008aa47f1230c1d7b4cca07493e0a819e9227227122ce18dfd6dc4b16c86608838", 0x84}, {&(0x7f0000000080)="8cfb6c", 0x3, 0x2}, {&(0x7f00000000c0)="6511a51eab97858fbf9436c3ae73598f634802660b1d357a960015045c89fffd0f5b0a12cbc1", 0x26, 0x4}, {&(0x7f0000000300)="7bde31321b3774e26a5603d4b0867c1ceac7839750c6f39179df3ccc64a5f3fd9283b92b346747646e13d32e8e44755a7c08ce97f99b071766459c", 0x3b, 0x4}], 0x2840, &(0x7f00000003c0)={[{@hash_r5='hash=r5'}, {@noattrs='noattrs'}, {@resize_auto='resize=auto'}, {@usrjquota='usrjquota'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}], [{@smackfsdef={'smackfsdef', 0x3d, 'ns/pid\x00'}}, {@subj_user={'subj_user', 0x3d, 'nodev.\x89'}}, {@euid_lt={'euid<', r8}}]}) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r9, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 766.174532] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 [ 766.205764] ISOFS: Unable to identify CD-ROM format. 15:55:30 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000000)={0x8, 0x302d9dba2a25d206, 0x4, 0x3, 0x4, 0xed8, 0x8}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x5, 0x0, 0x1000}) 15:55:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xa00, 0x0, 0x0) 15:55:30 executing program 0 (fault-call:3 fault-nth:22): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) write$tun(r5, &(0x7f0000000000)={@val={0x0, 0xf6}, @val={0x6, 0x4, 0xbc43, 0x30a, 0x2, 0x4}, @mpls={[{0x20, 0x0, 0x1}, {0x945d}, {0x7}, {0xcce, 0x0, 0x1}], @llc={@llc={0xf4, 0xdc, "cf", "31d8cc706a54a3098ab6c60052987d9e1e32fc001ae64c7f5319d1fc5f89602fc3651c23f11232dffb32de6cf496dca13942b1fc496c39cc78188c31446f2a4cfcc18bfcf166b3ed3cf821a77683b3e45352cd92dffa7393fa863f3c68ab843e4091fce61634bb35c86395143e94ab3650cb830a014c05d8309cc4267b4320b022e39697d23001e0bdd42a3abfed99318d5bd6bfa4a9531fed7f7a025571baa321208c933cc6232d52d1c8264774977d416bc93ba5a7d150621fce5987220d9b452606482d63249cf89251901166e618"}}}}, 0xf1) 15:55:30 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000040)=r5) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 766.471305] ISOFS: Unable to identify CD-ROM format. [ 766.515404] FAULT_INJECTION: forcing a failure. [ 766.515404] name failslab, interval 1, probability 0, space 0, times 0 [ 766.526790] CPU: 1 PID: 28033 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 766.526802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.543044] Call Trace: [ 766.543062] dump_stack+0x172/0x1f0 [ 766.543078] should_fail.cold+0xa/0x1b [ 766.553101] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.558186] ? kasan_check_read+0x11/0x20 [ 766.562319] __should_failslab+0x121/0x190 [ 766.566624] should_failslab+0x9/0x14 [ 766.570406] kmem_cache_alloc_node_trace+0x5a/0x720 [ 766.575399] ? __lock_acquire+0x6ee/0x49c0 [ 766.579622] ? unwind_get_return_address+0x61/0xa0 [ 766.584530] ? __save_stack_trace+0x99/0x100 [ 766.588923] __kmalloc_node_track_caller+0x3d/0x80 [ 766.593837] __kmalloc_reserve.isra.0+0x40/0xf0 [ 766.598488] pskb_expand_head+0x154/0xe20 [ 766.602614] ? save_stack+0x45/0xd0 [ 766.606223] ? kasan_kmalloc+0xce/0xf0 [ 766.610097] ipgre_xmit+0x7d6/0xa80 [ 766.613710] dev_hard_start_xmit+0x1a5/0x980 [ 766.618101] ? check_preemption_disabled+0x48/0x290 [ 766.623102] __dev_queue_xmit+0x2704/0x2fe0 [ 766.627414] ? netdev_pick_tx+0x300/0x300 [ 766.631543] ? kasan_unpoison_shadow+0x35/0x50 [ 766.636110] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 766.641107] ? skb_release_data+0x144/0x7d0 [ 766.645419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.650943] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 766.656464] ? kasan_check_write+0x14/0x20 [ 766.660699] ? pskb_expand_head+0x57a/0xe20 [ 766.665007] dev_queue_xmit+0x18/0x20 [ 766.668792] ? dev_queue_xmit+0x18/0x20 [ 766.672767] __bpf_redirect+0x74b/0xc10 [ 766.676728] bpf_clone_redirect+0x2dc/0x480 [ 766.681032] bpf_prog_16657deb320fb2fe+0xc00/0x1000 [ 766.686035] ? mark_held_locks+0x100/0x100 [ 766.690275] ? __schedule+0x86e/0x1dc0 [ 766.694144] ? find_held_lock+0x35/0x130 [ 766.698190] ? pci_mmcfg_check_reserved+0x170/0x170 [ 766.703193] ? bpf_test_run+0x146/0x430 [ 766.707152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.712669] ? check_preemption_disabled+0x48/0x290 [ 766.717667] ? lock_acquire+0x16f/0x3f0 [ 766.721626] ? kasan_check_read+0x11/0x20 [ 766.725769] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 766.730946] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 766.736473] bpf_test_run+0x10d/0x430 [ 766.740262] bpf_prog_test_run_skb+0x64b/0xb20 [ 766.744837] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 766.749659] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 766.755178] ? fput+0x128/0x1a0 [ 766.758439] ? __bpf_prog_get+0x97/0x290 [ 766.762483] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 766.767316] bpf_prog_test_run+0x129/0x1a0 [ 766.771534] __x64_sys_bpf+0x397/0x4c0 [ 766.775403] ? bpf_prog_get+0x20/0x20 [ 766.779195] ? do_syscall_64+0x26/0x620 [ 766.783147] ? lockdep_hardirqs_on+0x415/0x5d0 [ 766.787722] ? trace_hardirqs_on+0x67/0x220 [ 766.792028] do_syscall_64+0xfd/0x620 [ 766.795811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.800984] RIP: 0033:0x459a29 [ 766.804159] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.823045] RSP: 002b:00007fb10bb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 766.830742] RAX: ffffffffffffffda RBX: 00007fb10bb0dc90 RCX: 0000000000459a29 [ 766.838001] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 766.845250] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 766.852497] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10bb0e6d4 [ 766.859747] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000005 15:55:31 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x1300000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:31 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x420) 15:55:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:31 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xc3) socket$inet(0x2, 0x5, 0xa6) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000000800010006080700418e00000004fcff", 0x58}], 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="88000000", @ANYRES16=r4, @ANYBLOB="010026bd7000fbdbdf250c000000080004000100008008000600880000000100010000000800080001000000380001000800080009000000080004004e240000080008000300000008000800ff7f0000080001000a0000000c0007000000000004000000100001000c000700110000002000"/130], 0x88}, 0x1, 0x0, 0x0, 0x10000}, 0x8) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xd0, r4, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="eb89fd7dce9239f76244a256f7ffadfc"}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x800}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0xd0}}, 0xc8c0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000040)={0x1, 0x1, [0x4, 0x4, 0xfffffff8, 0x8000, 0x81, 0x4, 0x80000000]}) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) ioctl$KVM_GET_MP_STATE(r5, 0x8004ae98, &(0x7f0000000000)) [ 766.997407] ISOFS: Unable to identify CD-ROM format. 15:55:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xb00, 0x0, 0x0) 15:55:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:31 executing program 0 (fault-call:3 fault-nth:23): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r6 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4a4b, 0x2080) getsockopt$inet_tcp_int(r6, 0x6, 0x24, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 767.107938] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.5'. 15:55:31 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x6000000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 767.151707] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=38 sclass=netlink_tcpdiag_socket pig=28047 comm=syz-executor.5 [ 767.210706] ISOFS: Unable to identify CD-ROM format. [ 767.231460] FAULT_INJECTION: forcing a failure. [ 767.231460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 767.243273] CPU: 0 PID: 28063 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 767.250202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.259637] Call Trace: [ 767.262239] dump_stack+0x172/0x1f0 [ 767.265889] should_fail.cold+0xa/0x1b [ 767.269780] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.269796] ? mark_held_locks+0x100/0x100 [ 767.269811] ? find_held_lock+0x35/0x130 [ 767.269829] __alloc_pages_nodemask+0x1ee/0x750 [ 767.283163] ? is_bpf_text_address+0xac/0x170 [ 767.283181] ? __alloc_pages_slowpath+0x2870/0x2870 [ 767.283195] ? is_bpf_text_address+0xac/0x170 [ 767.301807] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.306913] cache_grow_begin+0x91/0x8c0 [ 767.310963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.316487] ? check_preemption_disabled+0x48/0x290 [ 767.321490] kmem_cache_alloc_node_trace+0x655/0x720 [ 767.326577] ? __lock_acquire+0x6ee/0x49c0 [ 767.330800] ? unwind_get_return_address+0x61/0xa0 [ 767.335724] __kmalloc_node_track_caller+0x3d/0x80 [ 767.340649] __kmalloc_reserve.isra.0+0x40/0xf0 [ 767.345306] pskb_expand_head+0x154/0xe20 [ 767.349440] ? save_stack+0x45/0xd0 [ 767.353066] ? kasan_kmalloc+0xce/0xf0 [ 767.356950] ipgre_xmit+0x7d6/0xa80 [ 767.360571] dev_hard_start_xmit+0x1a5/0x980 [ 767.364965] ? check_preemption_disabled+0x48/0x290 [ 767.369970] __dev_queue_xmit+0x2704/0x2fe0 [ 767.374294] ? netdev_pick_tx+0x300/0x300 [ 767.378431] ? kasan_unpoison_shadow+0x35/0x50 [ 767.383003] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 767.388001] ? skb_release_data+0x144/0x7d0 [ 767.392315] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 767.397832] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 767.403367] ? kasan_check_write+0x14/0x20 [ 767.407610] ? pskb_expand_head+0x57a/0xe20 [ 767.411920] dev_queue_xmit+0x18/0x20 [ 767.415811] ? dev_queue_xmit+0x18/0x20 [ 767.419778] __bpf_redirect+0x74b/0xc10 [ 767.423743] bpf_clone_redirect+0x2dc/0x480 [ 767.428057] bpf_prog_16657deb320fb2fe+0xcc8/0x1000 [ 767.433066] ? mark_held_locks+0x100/0x100 [ 767.437298] ? __schedule+0x86e/0x1dc0 [ 767.441175] ? find_held_lock+0x35/0x130 [ 767.445225] ? bpf_test_run+0x146/0x430 [ 767.449192] ? find_held_lock+0x35/0x130 [ 767.453236] ? bpf_test_run+0x146/0x430 [ 767.457198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.462732] ? check_preemption_disabled+0x48/0x290 [ 767.467732] ? lock_acquire+0x16f/0x3f0 [ 767.471697] ? kasan_check_read+0x11/0x20 [ 767.475834] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 767.481013] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 767.486531] bpf_test_run+0x10d/0x430 [ 767.490322] bpf_prog_test_run_skb+0x64b/0xb20 [ 767.494890] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 767.499730] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 767.505251] ? fput+0x128/0x1a0 [ 767.508517] ? __bpf_prog_get+0x97/0x290 [ 767.512568] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 767.517396] bpf_prog_test_run+0x129/0x1a0 [ 767.521616] __x64_sys_bpf+0x397/0x4c0 [ 767.525488] ? bpf_prog_get+0x20/0x20 [ 767.529285] ? do_syscall_64+0x26/0x620 [ 767.533257] ? lockdep_hardirqs_on+0x415/0x5d0 [ 767.537825] ? trace_hardirqs_on+0x67/0x220 [ 767.542134] do_syscall_64+0xfd/0x620 [ 767.545923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.551097] RIP: 0033:0x459a29 [ 767.554272] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.573153] RSP: 002b:00007fb10baecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 767.580850] RAX: ffffffffffffffda RBX: 00007fb10baecc90 RCX: 0000000000459a29 [ 767.588101] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 767.595361] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 767.602614] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb10baed6d4 [ 767.609869] R13: 00000000004bfd97 R14: 00000000004d1b90 R15: 0000000000000004 15:55:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 767.633576] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=38 sclass=netlink_tcpdiag_socket pig=28065 comm=syz-executor.5 15:55:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xe00, 0x0, 0x0) 15:55:31 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000000)={{0x2, @name="96f39724eef246f04fc5683a5f14178a7f4adaed501699ddd3fc84b9da85f265"}, 0x8, 0x8}) 15:55:32 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xffffffffa0008000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 767.801261] ISOFS: Unable to identify CD-ROM format. 15:55:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r4, r2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x2, @loopback, 0x8f7}, {0xa, 0x4e22, 0x49ed4e66, @remote}, r4, 0x8001}}, 0x48) r5 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPCONNADD(r5, 0x400443c8, &(0x7f00000003c0)={r6, 0x1}) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="480000001500199009004b0101048c01010000ebbd2e2ab90d530000632379eb000000000000551f5f0028213ee20607000000000000003f666674a8ffff00c7e5ed5e00000000c8", 0x48}], 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r7, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in=@initdev}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xfffffe29) r8 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r8, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r9, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r12, 0x0) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='9p\x00', 0x1, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@version_L='version=9p2000.L'}], [{@audit='audit'}, {@dont_appraise='dont_appraise'}, {@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'ns/pid\x00'}}, {@uid_lt={'uid<', r12}}]}}) r13 = msgget(0x0, 0x200) msgctl$IPC_RMID(r13, 0x0) ioctl$UI_END_FF_ERASE(r5, 0x400c55cb, &(0x7f0000000400)={0xd, 0x0, 0x1}) 15:55:32 executing program 4: syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x400, 0x1be411e7a537826) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) vmsplice(r0, &(0x7f0000000640)=[{&(0x7f0000000140)="c77e59201468a57faad82ae65d61e3ff0a7ee4b1b9ade4236f368098e026518b054c0a93312ece9c48e272aa1f1b4a05dc06c91f17da33e3a4f8dd1d98ba428bab1de648d29414cc40136c42dd0ad45eec882abcdfc88f3267b4ea247b485f3b1c8418d2a035ba9e30f6784add8c270ce886ededb848d92a350178717ace2a211c4037c31dd2950429110c1ec5b16bde7d94e14da607bb288cf026e9cbe7dce4065b9bcc0140ac2cb4d954dfa66bba88af78106065922f510b84fc4580d479e97f7380b3c3f6bfafcc2b383e3902c173", 0xd0}, {&(0x7f0000000300)="bd8c1b226ee29bf0e60b99621fc24033a985006e3d52037e163b1898e0d9b4f9717f6b16fd8361798552c22d12772660491bad71b7c7317fbce12458ab676df5a58191d0623eb196b8ba1b465b9a14ea5073e36669a11770579110bdd1ac3b007bcc70515685501fdeda051d596ef1cd3eef5eaa64bc716948723cc3cd42711d38e0503332fe3d138729298a2777be85894640f8529783d7db36ad275b6efaf00c687cd6f3e1e2f3c2b61658a02474b7", 0xb0}, {&(0x7f00000003c0)="94d5ebc0fd69d82dbb67193ee7ad46d0b6e857f7a4eb1938446565bcd149f92b45fcba88d73d1d871da5479c70d960ac76fdf737e4552cab43ea24739e8ca485435134a11bcf7581b536bea9ae3fa15c284c0aa2ebdce88d21aff2f23e052f46bf438e6f2f2dac2ec6b5f18a677a1d1d7dafa91c3f23be0c69faffa70d81938c075c2389aaa6e9775e26a5c8b772af01c59c1d2aef34cfbf0d267cef44344c27c7218e3d3c19611187afb2a1bd58a07b7e6132f5081eccb0eb023989aec819a1eafd40cdd54a291ac87285550f78b8e462d312c735cf4fd90c8a4b9b9232a186cfdd0b", 0xe3}, {&(0x7f0000000080)="e80c2994a65c703e372a636789181cb80287392da7798e223b37191ed6538c12de011b35a6ee93ce0c90c638cec9de96231ab867850086b9415b9df6fbc33a82f6ed9730ee8f79b011885dacb0a4ad52857cc33a295f6e100f1b4ba6f47081c1e153b82b70126157d47daf7852ad1395", 0x70}, {&(0x7f00000004c0)="d177f56ccb123661515e16c1b08d536b9f43d340e40ceb6f4c34b558fa158812cd108c5768bbca493189fefbe58f789518720f087213c3dd12e020ce2a7b6260dd99257c7a686fb091c855692936903285622cacd0506e95aabc7f2448b2c4314af0e64a43590eb9d064b10c43366491c4b633fa2d33309f6d5eba52280c572d3f98e69f2a25299b2a05928317f3a88474f8414014c471e90d8fa2e1de8b2f68c4a8", 0xa2}, {&(0x7f0000000240)}, {&(0x7f0000000580)="047ffa6fadc9c059e568a7f45b928c8d9e6ff6326717fb5a8a27742c832db7f482aa371151d2e7e7fad8a3396709748e9c340e4b63ac81150fef7319c0f00adbf530887fe400add731351a6cd78de50f2c88e73337d83af4dda02844be3a68529b395016ebc35a07bc0f5ea3b39cc81fb8490302dae9d2b9d15c141d391052e729d50bf37582322d5a6a8166b81432c741696d53", 0x94}], 0x7, 0x10) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x8242, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0xea60efca6b071576, 0x0) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000840)=0xfffffff8) getsockopt$inet_opts(r5, 0x0, 0x9, &(0x7f0000000700)=""/53, &(0x7f0000000740)=0x35) setsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f00000006c0)=0x8, 0x2) r7 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_netrom_SIOCADDRT(r9, 0x890b, &(0x7f0000000780)={0x0, @null, @netrom={'nr', 0x0}, 0x200, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5ba, 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) syz_kvm_setup_cpu$x86(r8, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 768.006183] ISOFS: Unable to identify CD-ROM format. 15:55:32 executing program 5: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x1100, 0x0, 0x0) 15:55:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:32 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0xfffffffffffff000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:32 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2100, 0x0, 0x0) [ 768.256504] ISOFS: Unable to identify CD-ROM format. 15:55:32 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000001380)="ff", 0x1, 0x0, &(0x7f0000001280)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x16}, 0x5}, 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000018c0)={0xa, 0x0, 0x0, @rand_addr="31a51e1976d1406c787e63ca6c20350f"}, 0x717000) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000080)={0x2f, @dev={0xac, 0x14, 0x14, 0x29}, 0x4e22, 0x0, 'fo\x00', 0x8, 0x7ff, 0x4}, 0x2c) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0xf5, 0x9, 0x7f, 0x1, 0x15, 0x9d, 0x9, 0x85, 0x941, 0x2}) 15:55:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:32 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x2}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 768.518135] ISOFS: Unable to identify CD-ROM format. 15:55:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x3000, 0x0, 0x0) 15:55:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:32 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x6) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4138ae84, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000240)=r2) r3 = syz_open_dev$vcsn(&(0x7f0000000880)='/dev/vcs#\x00', 0x1, 0x18800) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f00000008c0)={{0x2, 0x4e21, @local}, {0x306, @broadcast}, 0x28, {0x2, 0x4e23, @rand_addr=0xffff0000}, 'nr0\x00'}) syz_open_procfs(r2, &(0x7f0000000000)='mountinfo\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) accept$netrom(r5, &(0x7f0000000280)={{0x3, @null}, [@remote, @null, @rose, @rose, @default, @rose, @null, @rose]}, &(0x7f0000000080)=0x48) setns(r4, 0x0) openat$cgroup(r4, &(0x7f0000000040), 0x200002, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose, @default, @default]}, 0x48) fcntl$setlease(r0, 0x400, 0x3) 15:55:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:32 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x400400, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setns(r1, 0x20000) dup2(0xffffffffffffffff, r0) syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x80, 0xa0400) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4(r1, &(0x7f0000000080)=@caif=@util, &(0x7f0000000140)=0x80, 0x80000) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)=0x9) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) accept4$alg(r7, 0x0, 0x0, 0x0) 15:55:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getegid() r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:32 executing program 5: syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x222000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x400000, 0x1c0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000080)=0x10000, 0x4) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140)) write$FUSE_BMAP(r0, &(0x7f00000000c0)={0x18, 0x0, 0x2, {0x80}}, 0x18) ioctl$CAPI_NCCI_GETUNIT(r2, 0x80044327, &(0x7f0000000280)=0x4) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r3, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) [ 768.784565] ISOFS: Unable to identify CD-ROM format. 15:55:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:33 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x4}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x3f00, 0x0, 0x0) 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:33 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000000)={0x0, {0x9, 0x2}}) [ 769.032684] ISOFS: Unable to identify CD-ROM format. 15:55:33 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) ioctl$EVIOCGABS0(r6, 0x80184540, &(0x7f0000000000)=""/4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r7, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r8, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:33 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x17) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x6) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4000, 0x0, 0x0) 15:55:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r6, 0xc040564b, &(0x7f0000000000)={0xffffff49, 0x0, 0x5001, 0x0, 0x7f, {0x5, 0x1}}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, &(0x7f0000000040)={0x0, 0x0, 0x2024, 0xfff, 0x0, 0x9, 0x3}) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:33 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xa}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:33 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose, @remote, @default]}, 0x48) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x100000001, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r8, 0x4138ae84, 0x0) fcntl$getownex(r8, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r7, 0x8902, &(0x7f0000000240)=r9) sendmsg$nl_netfilter(r2, &(0x7f0000003840)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x3584, 0x3, 0x7, 0x8, 0x70bd2a, 0x25dfdbfd, {0x7, 0x0, 0x1}, [@generic="50e15d420001", @generic="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", @generic="ffe11652d461c3d28eabc052865bd6b353894ca57a0040bee9f6c6ee6cde2cef6d2f4e22b14f0c0b794a78d29ac77f55028e4f1710ecb4bc626b124deb", @typed={0xc, 0x23, @str='selinux\x00'}, @nested={0x1288, 0x5c, [@typed={0x14, 0x7a, @ipv6=@rand_addr="79c8ba086dca266948c61d106b0d7141"}, @typed={0xc, 0x87, @u64=0x3f}, @typed={0x8, 0x11, @uid=r6}, @typed={0xc, 0x96, @str='ns/pid\x00'}, @generic="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", @typed={0xd8, 0x8b, @binary="1b2babbb4ee7d1f26da69f708129d9afe73e8c12c8c6cf64044c4e3f8c41bd44bd3275fc6b495e034f9036920732dae0d123ad5d01f876fb7c30c2d73d9073460d66ea09a2615b49c8f092913925ab2e911232523b8863307ce3d838a1083e247a84e2e658e04d126a20361f9bd033824778a6fd152feac4e0f83b7bdf3e5b0abfc629e567c2f2143609e323bbf942729c48b5ce3618079367e256c313f3987f5984e499273aa0b1297ed7d5de16f07f58dd97b96e89963df8b1ba4640f8de6c853a7044b2338fd1bf3fd3c4dc43d39ba2"}, @generic="c37c8a02abb4a4ea91837234afc319f6c2d1c083424637d68fe5726718fd50146b68b012363ce45c5bc35fbb88bd687db43b8b457c5ffe6c21d41fb60f9404d01367b77e8afd9d06e5bc68095aa104986d5f64def0bd3a348443f833ef379204b7dc6f94628a7af29ac3649c74ee2bb529a6e525a2d564fad587594bf6ea7d5a16875e9faf45f8ab909f878a61026428adf94757", @generic="c3181afe0717e83eace30cfc4e72905a0ed923bd271a", @generic="e095b5effda9080a505c6e80b8233c7fba37cbf155f1aff21f9f3931ea078c00bad6fd993f356a9b7f8e95a2c4317f1d392ec12ab4055b78b2d2a3f3d912551c9cd78ad199b204fcde7a6cbe051688a366bb9096e275107f62450639404d1060ff23597ca21b54057410c48e14ecb54aead3f566202a66601bd41e5181298f09cfa82b838551425402d5f68bac74668d85ef5e53cebeb2c69cbc91a0f7b50b687cd14664fc6a656975dac0793c14c6110aa18381c7ab4d81e296b29b350061fa6a1298bfc9544e6336497d94cb0d"]}, @nested={0x1284, 0x8, [@typed={0x8, 0x5c, @pid=r9}, @generic="4d5da8b1cc81f601e9bad2113eec4ed6022f129eccefe5b29064447b01ff205f77954efc31ec7332684b0c6268455dd8a257d306e2528833b5c4ff7dee83ffe1ad552f592c660e", @generic="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", @typed={0x14, 0x4c, @ipv6=@ipv4={[], [], @multicast1}}, @generic="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", @generic="8d030cd2c0fbb9294bef0a6aaf49d3a9d6b1cef8283e053bc4327709073d7bc5f17843b13dcf491372e4acde03c7a7bbe5a9749f847e83cbf471ab8453f2ba2bf272f06dada07f6d498ade03ac305712d083b96bfb2745da8434ff16806a82e6293f67252b71e964b59fbab3ffd97563590ec0e474f63b0b13fc4b23e0f41bd35dd14835", @generic="1013406adbd8b7371fcbfc304cffcf20b54ae0ccceb2caa0b0f0dfd72cfa70b4d68fa8cb210446e9fbed6fbf8fbaa0638f03580b0cbe7a158f5bffdaac7712d42c3bb3d91f7fb13f1aa9d9575d024104bde61a38e27413042169c4223b353cf6a15789c8839222ffd470604c826fce72449df89705096de2e0192cf82a1775d1e47009bb8ed05e3e39b681519d5e0345868f0ad539a198b2cf2bc178"]}, @typed={0x14, 0x22, @ipv6=@remote}]}, 0x3584}, 0x1, 0x0, 0x0, 0x40001}, 0x4081) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x6}, &(0x7f0000000100)=0x8) keyctl$set_timeout(0xf, r1, 0x80000001) [ 769.374996] ISOFS: Unable to identify CD-ROM format. 15:55:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x80000) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x5800, 0x0, 0x0) 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$CAPI_INSTALLED(r7, 0x80024322) [ 769.615076] ISOFS: Unable to identify CD-ROM format. 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 769.816902] ISOFS: Unable to identify CD-ROM format. 15:55:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) fdatasync(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x303300, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) recvfrom$unix(r4, &(0x7f0000000300)=""/4096, 0x1000, 0x20002181, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 15:55:34 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xe}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x6000, 0x0, 0x0) 15:55:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x6000090}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0xe8, 0x0, 0x700, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0xffffffffffffff46, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x820c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, '.(W\x0e\x18\x86\x0e\xf3\xa3\x014\x18\xec\xc5X\xb6\x96\'\x9bX+\xb0\x1ey\xceo\xae\xfc\xc0\x9e\x03\xe797\x1ag\xba\x85V\xfaY8b1^9\x97\\\xac\xf4cwW<\xfb\a$\xa3\xea\xbdty\x94\x81Q\xfa\xb1\x01H9t\xac$\xf1{\xfd\xfe\x00'}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1322a87a}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffa}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x3f}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xffff, @local, 0x7}}}}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8c109b055f136d68}, 0x10) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PPPIOCSACTIVE(r7, 0x40107446, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r8, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 770.307704] ISOFS: Unable to identify CD-ROM format. 15:55:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xeb79, 0x80880) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x180) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f00000001c0)={0x1, 0x7}) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000040)=""/53) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r7, 0x40286608, &(0x7f00000000c0)={0x10001, 0x3, 0x3, 0x8, 0x2, 0x9}) 15:55:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xf000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:34 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x13}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x80fe, 0x0, 0x0) [ 770.532675] isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 15:55:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000140)={0x269, @tick=0x1a63, 0xfd, {0x9, 0xfd}, 0x20, 0x1, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000080)=@v1={0x0, @adiantum, 0x0, "6cd4cf9cd8cb1102"}) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) [ 770.575915] ISOFS: Unable to identify CD-ROM format. 15:55:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:34 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x60}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8405, 0x0, 0x0) [ 770.735377] isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 15:55:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$nfc_llcp(r4, 0x118, 0x1, &(0x7f0000000000)=""/46, 0x2e) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r7, 0x14020000) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000040)=0x0) r9 = dup(r4) ioctl$PPPIOCGUNIT(r9, 0x80047456, &(0x7f00000000c0)) mq_notify(r6, &(0x7f0000000080)={0x0, 0x2a, 0x4, @tid=r8}) 15:55:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe0, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) inotify_add_watch(r8, &(0x7f0000000000)='./file0\x00', 0x20) 15:55:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xffe0, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 770.898023] ISOFS: Unable to identify CD-ROM format. 15:55:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x11000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) inotify_add_watch(r8, &(0x7f0000000000)='./file0\x00', 0x20) 15:55:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FICLONE(r3, 0x40049409, r6) 15:55:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xac05, 0x0, 0x0) 15:55:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xffffffe0, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 771.069027] ISOFS: Unable to identify CD-ROM format. 15:55:35 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xf0}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) inotify_add_watch(r8, &(0x7f0000000000)='./file0\x00', 0x20) 15:55:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xffffffffffffffe0, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r5, 0x0, 0x9, &(0x7f0000000000)='/dev/kvm\x00', 0xffffffffffffffff}, 0x30) r7 = syz_open_procfs(r6, &(0x7f0000000100)='4|e\xb9\xf62\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xc0fe, 0x0, 0x0) 15:55:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) [ 771.370785] ISOFS: Unable to identify CD-ROM format. 15:55:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002e0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000040)) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000000)={0x3, r4}) getpgid(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4138ae84, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r6, 0x8902, &(0x7f0000000240)=r8) r9 = syz_open_procfs(r8, &(0x7f0000000080)='net/soakstat6\x00v\xd3&\x1ef\x8f\xa21\xae\xe5\x8f\x1d\x81\xdc\xd6\x93xp~z\xbf\'\xf9\xaf\x83 P\x1c\x9c\x98\x91\x13\x8c\xe9\xb6\xadz\x9c=\xb3\x8bf\xf15\xc2') syz_kvm_setup_cpu$x86(r9, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x13000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:35 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xa00}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xd, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xe803, 0x0, 0x0) 15:55:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') [ 771.628292] ISOFS: Unable to identify CD-ROM format. 15:55:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x142380, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x14000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe4e, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:36 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xe00}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4138ae84, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000240)=r6) ptrace$getenv(0x4201, r6, 0x101, &(0x7f0000000000)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 771.898876] ISOFS: Unable to identify CD-ROM format. 15:55:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xf401, 0x0, 0x0) 15:55:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x15000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x20000f40, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') 15:55:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fsetxattr$security_smack_entry(r5, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfc00, 0x0, 0x0) 15:55:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000002, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 15:55:36 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x1300}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 772.180007] ISOFS: Unable to identify CD-ROM format. 15:55:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x16000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000040)={0xff, 0x6, 0x8, 0x82, 0x8, 0x8, 0x80, 0x6, 0x2, 0xe, 0x7f}, 0xb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_open_pts(r3, 0x10081) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xc7116d197b8f73f8, &(0x7f0000000080)=""/101, &(0x7f0000000140)=0x65) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r7, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 15:55:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfe80, 0x0, 0x0) [ 772.413734] ISOFS: Unable to identify CD-ROM format. 15:55:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000004, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 15:55:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r7, 0x20, "cb04e8", "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"}}, 0x110) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4138ae84, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000240)=r8) syz_open_procfs(r8, &(0x7f0000000140)='c\xcc\xf8\x04qMH\xc9\x8c\xd1\x04\ab-z6s\x00') syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:55:36 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x6000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x17000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfec0, 0x0, 0x0) 15:55:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 772.641829] ISOFS: Unable to identify CD-ROM format. 15:55:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x600000000100000a, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x18000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 15:55:37 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xf000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) [ 772.863944] ISOFS: Unable to identify CD-ROM format. 15:55:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x600000000100000e, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xff00, 0x0, 0x0) 15:55:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 15:55:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x19000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="7f73aafa0b56"]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 15:55:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000060, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 773.131866] ISOFS: Unable to identify CD-ROM format. 15:55:37 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x8000a0}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 15:55:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xff03, 0x0, 0x0) 15:55:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x208000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x34d, 0x0, 0x0, 0xffffffffffffffdf) 15:55:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x60000000010000e0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 15:55:37 executing program 4 (fault-call:4 fault-nth:0): r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) [ 773.467495] ISOFS: Unable to identify CD-ROM format. 15:55:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20480, 0x0, 0x0) 15:55:37 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x80ffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:37 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 15:55:37 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) recvfrom$llc(r2, &(0x7f0000000080)=""/65, 0x41, 0x40004102, &(0x7f0000000100)={0x1a, 0x30e, 0x8a, 0x1, 0x1, 0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) 15:55:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x60000000010000f0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 773.752163] ISOFS: Unable to identify CD-ROM format. 15:55:37 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote, @default]}, 0x48) close(r0) 15:55:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x100000, 0x0, 0x0) 15:55:38 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xf0ffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 15:55:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x23000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x9b22, 0x2) syz_open_pts(r2, 0x20) 15:55:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000a00, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000a0, 0x0, 0x0) 15:55:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x100) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x178, r3, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x104, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb51f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe8f1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x24}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x64014049}, 0x4040000) close(r0) 15:55:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 774.032449] ISOFS: Unable to identify CD-ROM format. 15:55:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000080)={{0x3, @bcast, 0x81}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) close(r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) 15:55:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 15:55:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000e00, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:38 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x1000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x1000000, 0x0, 0x0) [ 774.243523] ISOFS: Unable to identify CD-ROM format. 15:55:38 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 15:55:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000280)={"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"}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100, 0x40000) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/1061], 0x410) 15:55:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 15:55:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000e5a, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 774.493881] ISOFS: Unable to identify CD-ROM format. 15:55:38 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101000, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000000c0)={{0x3b, @multicast2, 0x4e23, 0x3, 'nq\x00', 0x1, 0x4, 0x24}, {@local, 0x4e23, 0x20004, 0x7, 0xffffffff, 0x6fe}}, 0x44) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) close(r1) memfd_create(&(0x7f0000000000)='\x00', 0x1) 15:55:38 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x2000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:55:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x1030000, 0x0, 0x0) 15:55:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:55:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$smack_current(r2, &(0x7f00000000c0)='\x00', 0x1) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x14) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2, 0xe71905c32c7a5b8, 0x90, &(0x7f0000ffb000/0x2000)=nil, 0x8e1b}) close(r0) 15:55:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000e72, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 774.728948] ISOFS: Unable to identify CD-ROM format. 15:55:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:55:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f00000001c0)={'ip6gre0\x00', 0x4}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000000)=0x103, 0x3f0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) setsockopt$ax25_int(r4, 0x101, 0x8, &(0x7f0000000080)=0xffff, 0x4) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose, @remote, @default]}, 0x48) semget(0x0, 0x3, 0x10) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x10000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000140)=0xd30, 0x8) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000180)={0x3c, @remote, 0x4e23, 0x2, 'nq\x00', 0x10, 0x4, 0x30}, 0x2c) close(r0) 15:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:55:39 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x4000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2000000, 0x0, 0x0) 15:55:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001002000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @default, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 775.023365] ISOFS: Unable to identify CD-ROM format. 15:55:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001003f00, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0xc3, 0x0, 0x8001, 0x9}, 0x10) close(r0) 15:55:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:55:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x3000000, 0x0, 0x0) [ 775.181095] ISOFS: Unable to identify CD-ROM format. 15:55:39 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xa000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 15:55:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001005a0e, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101080, 0x0) getsockopt$inet6_buf(r2, 0x29, 0xca, &(0x7f0000000080)=""/56, &(0x7f00000000c0)=0x38) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @remote, @default]}, 0x48) close(r0) r3 = request_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0) r4 = request_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r4, 0x0) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000480)="008106e358b6ebb35651", 0xa, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r5, r6, r5}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r3, 0x0) r7 = add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000280)="0c6252ba8b26992c28202bbdbc5e28666215e6192f2d9ae1bf6497609d944594815e9913133b0328ba4ae70ee8e6981a2b28e2cc395677c4cbe6038f0a60762b179674c26bf345688426c264d2d018167a1b77a65aba1062df8adfbdde8e87dca6dd05eb770c591ee82656b92f6a28e9b307e78cec3760c3fc154b54243fd44b3a5d30afe58d1d459ae851bd534f3afe0b654666a754618c6c70b7dca504db7ff9fda4684660024edd8577ab26a7eb4408392b72217e5ecf28bf579860af18afea45a7df7454aec4f9560f7344a0a5eb3a6467fcd64d87fd6b2453bcef927d7f39e7650fdf817e7646ea35172c11d81010ec1b5f5e82", 0xf6, r3) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r7, 0xd3, 0x97}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d7261772068e173683d6d69636861656c5f6d69632d67656e6572696300"/66], &(0x7f0000000400)="f4b24a42a4fbf988e2d7bb921a48bfa4bd2a7094f77439ee51b727593a2c6d084715ab4bc791714e19560398d7ce9d41aa5623bc272eee90fd98767f2886912e4f8335fe07a80448495498bf44a6cdb2458ef635dc20f58ae3ba74aaec0c22592b18cd93f83e94efdc962824444ef63c85c90ab93775a6fb3bf06f5d90f587ec7338fdd038b9b69118ea166f1fdf8d96fd30d0cdb19e1e7387e09abbe88f9d86c906fd306c88e2803534213053cbc4911118483b28efa54dc52af7227337a8947f6c5d75443cf729d6c2b5aafd3624f0175de3", &(0x7f0000000500)="75c949512d5c0af5cf41a3b29ed541ffd04cb9345ccf67d65279b9c3b4b5075d9e3b7ddafcc5a76f8979e20a5610a77709ca613b44cb74b6b3ee0981714acb0cf34a90e11e1128c5c5485f6c98e1581edbf453efec25ec91d5e1240ebfe522e48ca14189817a0e6c5a8f6f56fd0601149324fc3de4e6fad9fec9d05a0cfead74f0120a956788dfea8da7a1ced21a33179d51be9ff8c1aa") ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000600)) r8 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x20a000, 0x0) write$eventfd(r8, &(0x7f00000005c0)=0x40, 0x8) 15:55:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 775.410032] ISOFS: Unable to identify CD-ROM format. 15:55:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) setns(0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r2, r3}}, 0x18) 15:55:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4000000, 0x0, 0x0) 15:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:39 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xe000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 15:55:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001006000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 775.657043] ISOFS: Unable to identify CD-ROM format. 15:55:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 15:55:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x5000000, 0x0, 0x0) 15:55:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 15:55:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x600000000100720e, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 775.877503] ISOFS: Unable to identify CD-ROM format. 15:55:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 15:55:40 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x13000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xff0f0000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0xc0185502, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) pipe(0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x273) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000280)={0x2, 0x4, 0x0, 0x0, 0x101}) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:55:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x600000000100e0ff, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x6000000, 0x0, 0x0) [ 776.117331] ISOFS: Unable to identify CD-ROM format. 15:55:40 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x60000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x600000000100f000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xffff1f00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0xc0185502, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) pipe(0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x273) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000280)={0x2, 0x4, 0x0, 0x0, 0x101}) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 776.674216] ISOFS: Unable to identify CD-ROM format. 15:55:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x600000000100ffe0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x7000000, 0x0, 0x0) 15:55:40 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xa0008000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:41 executing program 5: 15:55:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:41 executing program 5: 15:55:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000002000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:41 executing program 5: [ 777.175312] ISOFS: Unable to identify CD-ROM format. 15:55:41 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xffff8000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000000, 0x0, 0x0) 15:55:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) read(r0, 0x0, 0x0) 15:55:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x600000000a000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 777.412543] ISOFS: Unable to identify CD-ROM format. 15:55:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae89, &(0x7f0000000300)={0x7b, 0x5, [0x186, 0x4c], [0xc1]}) 15:55:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x9000000, 0x0, 0x0) 15:55:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x600000001fffffff, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:41 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xfffff000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 777.660711] kvm [28802]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x4c [ 777.698829] ISOFS: Unable to identify CD-ROM format. 15:55:42 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0xc0185502, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) pipe(0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x273) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:55:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000020000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xa000000, 0x0, 0x0) 15:55:42 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x8000a0ffffffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x60000000e0ffffff, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 778.209593] ISOFS: Unable to identify CD-ROM format. 15:55:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9e00300000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x1, {0xa, 0x4e20, 0x1000, @mcast2}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r1}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000000c0)={0x609638bc3840df83, 0x8, 0x4, 0x800}) bind$ax25(r2, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r2) 15:55:42 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x7ae49d3d85f33467, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:42 executing program 5: 15:55:42 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x80ffff00000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xb000000, 0x0, 0x0) 15:55:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:42 executing program 5: 15:55:42 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x8}, [@null, @default, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote, @default]}, 0x48) close(r0) 15:55:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ffe000000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:42 executing program 5: [ 778.599317] ISOFS: Unable to identify CD-ROM format. 15:55:42 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x140400) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="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") r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000000800010006080700418e00000004fcff", 0x58}], 0x1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000001440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000001540)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f0000001500)={&(0x7f0000001480)={0x68, r4, 0xfbd6b474b1c68c45, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x6}, 0x80) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @bcast, @rose, @remote, @null]}, 0x48) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') recvmsg$kcm(r5, &(0x7f00000013c0)={&(0x7f0000000280)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, &(0x7f0000001340)=""/116, 0x74}, 0x3002) setns(r5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r7, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000001c0)=0x10) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) close(r1) 15:55:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:42 executing program 5: 15:55:42 executing program 5: [ 778.734539] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=44 sclass=netlink_tcpdiag_socket pig=28868 comm=syz-executor.4 15:55:42 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xf0ffffffffffff}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xe000000, 0x0, 0x0) 15:55:43 executing program 5: 15:55:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ffe0ff000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 778.828745] ISOFS: Unable to identify CD-ROM format. 15:55:43 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @null, @null, @bcast, @null, @remote, @default]}, 0xd) close(r0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0\x00'}, 0x18) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x50, r2, 0x0) setsockopt$inet_buf(r1, 0x0, 0x25, &(0x7f0000000080)="f3dcdd2b689eb6896e40f270d944c1dabc42b3d1d87c9ff51c1ff5e44308a4ae63b458fbe4dfece099c63c53aa26e12575f84ed178c888ca61a903b80e2df4f820ca8571d0c1f5016c45fa8e67e83c90de56d7029899e817c98cec21573db1438bc7ae784e058b", 0x67) 15:55:43 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="50b995c3ce11640f05"], 0x9}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:55:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:43 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$CAPI_INSTALLED(r2, 0x80024322) close(r0) [ 778.979895] ptrace attach of "/root/syz-executor.5"[28887] was attempted by "/root/syz-executor.5"[28888] 15:55:43 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:43 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x100000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0302000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:43 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @random="437093fef285", 'teql0\x00'}}, 0x1e) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r1) [ 779.079130] ISOFS: Unable to identify CD-ROM format. 15:55:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x10000000, 0x0, 0x0) [ 779.124530] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:43 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 779.176795] SELinux: failed to load policy 15:55:43 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x290000, 0x0) close(r0) [ 779.294343] SELinux: policydb version -1040894106 does not match my version range 15-31 [ 779.321638] ISOFS: Unable to identify CD-ROM format. 15:55:43 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4100, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000080)={0x2, "ed4b682ea3e022eb1a286746c2d8f50e6bc843fd6858b0fbce07098197139c87", 0x4, 0x4, 0x2, 0x1, 0x4, 0x1, 0xb62}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:43 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x200000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 779.356180] SELinux: failed to load policy 15:55:43 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0304000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:43 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000080)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @default, @default, @bcast]}, 0x48) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) r4 = socket$rxrpc(0x21, 0x2, 0x2) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffc4b}, 0x48) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'hwsim0\x00', r6}) bind$can_raw(r3, &(0x7f0000000100)={0x1d, r6}, 0x10) close(r0) 15:55:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x11000000, 0x0, 0x0) [ 779.469323] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:43 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) [ 779.538625] SELinux: failed to load policy 15:55:43 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f0000000140)={r2, r3+30000000}, &(0x7f0000000180)) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getsockname$ax25(r0, &(0x7f0000000080)={{0x3, @null}, [@netrom, @null, @rose, @remote, @null, @remote, @remote, @bcast]}, &(0x7f0000000000)=0x48) close(r0) [ 779.582499] ISOFS: Unable to identify CD-ROM format. 15:55:43 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x400000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff030a000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 779.696568] SELinux: policydb version -1040894106 does not match my version range 15-31 [ 779.715725] SELinux: failed to load policy 15:55:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x21000000, 0x0, 0x0) 15:55:43 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:44 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) [ 779.861540] ISOFS: Unable to identify CD-ROM format. 15:55:44 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:44 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xa00000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff030e000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:44 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) [ 780.131862] SELinux: policydb version -1040894106 does not match my version range 15-31 [ 780.144762] ISOFS: Unable to identify CD-ROM format. [ 780.170748] SELinux: failed to load policy 15:55:44 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@default, @default, @bcast, @null, @bcast, @rose, @bcast, @default]}, 0x48) close(r0) 15:55:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x30000000, 0x0, 0x0) 15:55:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0360000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:44 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:44 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xe00000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 780.556790] SELinux: policydb version -1040894106 does not match my version range 15-31 [ 780.595159] SELinux: failed to load policy [ 780.630069] ISOFS: Unable to identify CD-ROM format. 15:55:44 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:44 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) bind$ax25(r2, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @default, @rose, @remote, @default]}, 0x48) close(r0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000000)) 15:55:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03e0000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 780.750785] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:44 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xca) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @descriptor="a87b1fc48997cc28"}}) 15:55:44 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x1300000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 780.800786] SELinux: failed to load policy 15:55:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x3f000000, 0x0, 0x0) 15:55:45 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:45 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @rand_addr=0x7}, 0x80, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000)='ip6gre0\x00', 0x400, 0x1}) [ 780.921702] ISOFS: Unable to identify CD-ROM format. [ 780.930987] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 780.962280] SELinux: failed to load policy 15:55:45 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) eventfd(0x401) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) close(r0) 15:55:45 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40000000, 0x0, 0x0) 15:55:45 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0x6000000000000000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 781.103551] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03000a0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:45 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) [ 781.155281] SELinux: failed to load policy [ 781.174682] ISOFS: Unable to identify CD-ROM format. 15:55:45 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000080)={{0x3}, {0xe1, 0x3}, 0x3, 0x7, 0x6}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:45 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) bind$ax25(r2, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$getown(r3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns/pid\x00') setns(r4, 0x0) ioctl$VIDIOC_STREAMON(r4, 0x40045612, &(0x7f0000000000)=0xff) close(r0) [ 781.317436] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x58000000, 0x0, 0x0) [ 781.381921] SELinux: failed to load policy 15:55:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03000e0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:45 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) [ 781.439980] ISOFS: Unable to identify CD-ROM format. 15:55:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 781.565711] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:45 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0xbef) fcntl$lock(r2, 0x26, &(0x7f0000000200)={0x0, 0x1}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000280)={0x7, 0x3, 0x79d8d863565feb2, 0x2, 0x101, 0x8, 0x6, 0xff, r7}, &(0x7f00000002c0)=0x20) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r8, 0x9d18ab4}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) ioctl$NBD_CLEAR_QUE(r3, 0xab05) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) r10 = request_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r10, 0x0) r11 = request_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='/dev/hwrng\x00', r10) r12 = request_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r12, 0x0) r13 = request_key(&(0x7f00000004c0)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)='/dev/hwrng\x00', r12) keyctl$search(0xa, r11, &(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x3}, r13) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000100)={r9, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @remote}, 0x81}}, 0xe0}, &(0x7f00000001c0)=0x90) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @default, @remote, @null]}, 0x48) close(r0) 15:55:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff035a0e0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:45 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xffffffffa0008000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:45 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x60000000, 0x0, 0x0) [ 781.692174] ISOFS: Unable to identify CD-ROM format. 15:55:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 781.776365] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03720e0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) [ 781.969427] ISOFS: Unable to identify CD-ROM format. 15:55:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x80040200, 0x0, 0x0) 15:55:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 782.135777] ISOFS: Unable to identify CD-ROM format. 15:55:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:46 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400, 0x0, 0x0, 0xfffffffffffff000}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300200d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x84050000, 0x0, 0x0) 15:55:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) 15:55:46 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @null, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @bcast, @default]}, 0x48) r2 = accept4(r1, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000000)=0x80, 0x800) fsetxattr$security_smack_transmute(r1, &(0x7f0000000600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000008f80)='TRUE', 0x4, 0xf87af5dfdba7a26) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000009580)) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000004080)={0x0, @in6={{0xa, 0x4e22, 0x0, @empty, 0x7fffffff}}, [0x3, 0xb4, 0x6, 0x1, 0x3, 0x7ff, 0x80000000, 0x1, 0x100, 0xffffffffffffffe0, 0x7f, 0x9, 0x5, 0x4, 0xc104]}, &(0x7f0000004180)=0x1b) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = epoll_create1(0x40000) dup3(r7, r8, 0x80000) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x66, &(0x7f0000000040)={r10}, &(0x7f0000000140)=0x8) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r11, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000093c0)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000094c0)=0xe8) ioctl$TUNSETOWNER(r11, 0x400454cc, r12) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000008dc0)={r10, @in6={{0xa, 0x4e23, 0x214, @remote, 0x1000}}, 0x1000, 0x7}, &(0x7f0000008e80)=0x90) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendmmsg$inet_sctp(r2, &(0x7f0000009200)=[{&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x10001, @mcast2, 0x1000}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000140)="a207b5ce30087d28659db67a9f28a319fecf319a2ac59df603d4c8df34133fe55b279b0158229aa3fcdc430b22b674712024723d3be69fe0a0c2695d572d3ac19e7031fab89a2d7320bf78606502af73cc0d8908f367dad01630e7727b7bcfb764388e616a62bc1da296e75f0d038a86e1318733c0921212984e70c6efcdac266a7962eba238ae6422", 0x89}, {&(0x7f0000000280)="03ab7235a5219c34ad20aef88fd5ba41f620b5afc23ab8aedbfcec2947ca97d038a496e82032cbd122b6bcd923fac5ffad3f53409033a137fdd542d0b6f6f50e729fad52994627df72b6435f6062060fc5049020bc94319059e5cca7063316d6333c06d503bb4d6a79049be4b6f5d892d8ae2a922433c2", 0x77}, {&(0x7f0000000300)="b66893e234d86b6d66f9f2b20d847d4cd5ee90400e7ae013b0f145f8760b807d46bb85772218e388e1ff7f5306745fd3ea4a208a5c36a7540d0b4f1e6522e16f7852d1a98c35eb1aaa229d0642a6e34ecd555ea6d818f71ba2f09238f9324c71706dce6bbb7f05481d192ef7226a182c0058f79683d4b451d83a89231789f633b7494b46adfe66dd02aa71f963075e3c12de56aad8872ec52e60babb35ed83d2de763e7a3e97c6b30514c3f0633965d139866fc4220741fc672f3a62ac26c0d3be3ea6caf20cd5af0c3b796e90cfdcfa3f9aa1390954145d3df5a4e1", 0xdc}], 0x3, 0x0, 0x0, 0x4000000}, {&(0x7f0000000440)=@in6={0xa, 0x4e23, 0x8, @rand_addr="7a66e2849fb874fae0d3c02ba85d8970", 0x4}, 0x1c, &(0x7f0000000940)=[{&(0x7f0000000480)="68c036c0c0cd5eec1d00a67788f534363e5691e49b003d606bee72017f101521e5e95a8cb82b6a9fb8aba94ea07f49a6cba4f335b3bdb22444f048b6", 0x3c}, {&(0x7f00000004c0)="dca29fbae90fe6dd1cce6c0c3753ffa34d2a53d573af617633f3152177409a34a1c0c3d223f8ea687442974af092452d7941c9f97a8cb3d0fd343ba2a58a28c3f95efb60526f9613570cb5a4052ca19fa11ba3f31ba28caf329dcf0b3d8ade39fa6d43c328555da3f5a625ecba12966a6a4d5252ce9b21efdc1c5724300bcb834861c1966cb8d3e6568c1791e2da82d576b5db5933078a5e62572fb00cff8693e316411654", 0xa5}, {&(0x7f0000000580)="8afbed386ff58997bdc263eae47f123b8245feb2bd434e5d1b129f91", 0x1c}, {&(0x7f00000005c0)="6293910cbe7f7948e737700af83396029d15e2130e19163647cd", 0x1a}, {&(0x7f0000000600)}, {&(0x7f0000000640)="5f9dc271fd38060f31d2b6177ab47284d370d2cf81dd8ba7544d62180e6d394fa169191d832065d64eca0f64e53cc5c54e70fe024478a5b9f9960037d753c0845006730190018bf18c7a9936cf53a13ea5eeec65af2d787444adcc473e584e77fdf18791714afa98341218c41e42c1e7e8e50098eb8f20d7c33ca85e49d76a6fe10dd875e702582dcecb336676109ac6cb726062a5f20330b098616fbc6afa9c7ae673a02bd881e4060c6c784a8ca0701c319d3a16f8c0dd2d466f18e3b86f1968b50d30b6ded22ee64d9f4b2f9927ff885a043985fe22fa9e5aad269c4f", 0xde}, {&(0x7f0000000740)="aa476806f3b9aa7e987dbec552211e58085e8418942e858361a600d9d42ed59d3f4eeb672276542cecaf25669928960392943b47d1200197db0ec09aa0c5adff3a53576e39528687280d8ec16cf6aae6e828ec5678c70c12b78a4525a60923b26c71a57acd6ddaf038ec921c7353fde4bbf4e6030f11a0137264f4c3877f0bdd5e9995b44fadc11b0f52c07df115019b42e1cf471d06a074", 0x98}, {&(0x7f0000000800)="ad2d289e04b6510dd03e8fc324ed8f7ed1f938e0a2d523faed289d8dce8e8f058a6efb023a0d09ab52383731aaf1625aea491dcb99af221546b60144dd6408cccaba22b3c729e7424042995f7e48e9633485441f4c0684186e40bd0b285491637384f6cbf42f7ff1f498958d64ebadfff43771a595b5016c9811bf3df3df5a132b7e250775e520ef66f21703fb393d0034e05f8c38f56efef866a90937422ec57986ac4520fe80ccab3c5ab7be5a3ef8a519b3013045380514b188afa199c79fdc2187583d77f4e76bcfc1af4483c18379bb", 0xd2}, {&(0x7f0000000900)="957f7fbe9003b4a76e9e2197b851b39ba72df21f0a1f4373ca89dfa8350c527cb02d1a723ff6010e7d28602db740b76bb55f64f0adf4556b", 0x38}], 0x9, 0x0, 0x0, 0x10}, {&(0x7f0000000a00)=@in6={0xa, 0x4e24, 0x800, @remote, 0x6}, 0x1c, &(0x7f0000000a80)=[{&(0x7f0000000a40)="68c55e592cada1f0", 0x8}], 0x1, &(0x7f0000000ac0)=[@init={0x18, 0x84, 0x0, {0x2, 0xfff8, 0xffff, 0x1}}, @init={0x18, 0x84, 0x0, {0x7, 0x3, 0x7ff, 0x5}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x4}}], 0x48, 0x44001}, {&(0x7f0000000b40)=@in6={0xa, 0x4e21, 0x3, @empty, 0x9}, 0x1c, &(0x7f0000003fc0)=[{&(0x7f0000000b80)="f6c5495f57a4a0cbee4239122036e726d0444a6b5120b8a4f9c842452525ddca949057d78e5d5fa086359f243806cbce37f8126c80db485bd24bab77ad3ef9ce5c06471e588df1fd3fdf619cfc0d7c99544510ea849a57a79146e68780e6a235e42fa1579305bbc04e54462fe375c43f0bb71e818a237f6ee20b8ccf089c54c4c57e2a1c0ceacd2361279f93a1b5ddb7b9070df5c9603d1796a6e380a83362f24fe8c246b841da258f6245dcfddac30d192d9c6c5c88e5d8388bff8abc2708868dc78c3037b691c7395c5e9df188b166e1c30c08c8d654372ba6c1ead5921162243e4a2ba6792c737f97fc501f6993b8543c1b666245766f1085cf4700e45d1b287437882044b388ba6d9bae1e9be3465fd42a512b225fc27fb66b2055617881854f8d34ce85a5fdc346cec65e93669ad6bde4e83a02e1556b7b651f162d9e605b9ce3bf6b7412b9016701ade34650b80b4fe5a131830b1604b4c5818b6200949d507e4deab87bb734c93b5585794d4b3f1c72cf1d0c8b67056e53c6fb8eb21ff7c9115d792f3c336f1250c5d51c4ddc746617f2bbe80b547c9f9f947b0d859e67fd8ace78431be6becf3b630067c466a7f75761674ff92cd82a0a73cf1ce4e3508cf7254b05bdf22ab43c2da42e67ff889b45b491656dd27ea412bd02e135a6bc4c47479fd64948ae3ba97b7f5b0709eb7e636f93780baafc67aed3041ae2ade25ca5e0c5bb71241001ac43ffd9af0a9707eb7028d27d74a4768fdc427ddc317cb6ca53773aaf01ce187e2df227c192de2176346709249a24f06b4a32795ad426ad199ff0ae102c17a9d0f744fa2468a681623e29d663e6a58e7056da2860467d54ae3d46d14ff9583dc7e6b87388d0d8e8bccf6ea35d757f760f607b6343e1db97f3002c7cad129ca4938bccc65de91709369138c18b0f7f1b8afe03ceeaaae3bc846f7fade54a34dd3b9ba1f8a7dae377e80e69d0eaac2ca556bc4aa29da896494fea66230f47811e5aede8935cef9a6f0d8148cb74a0fdb78444c9f8f32c7db2b8519e5f88cffa1e38b473df99efadc94210a7ddeedfee92bc52aee24e57f2adc41cb16e9d9b0c4143abadc827fcda7ec90168aa93a9af0f8b686a08603dd123382327ba9ab7d102148064f4e4bdf489bf922acc72dba88f0254bf0489e5d0284d1dae937da33220418ab4c532af1142147be4671d21b2e7f0d1dca1154ddcdd098383dc5e1e54413d8ef1be6fc01aa8a5da60a694ceafc45e1c4730f50e1f661c8a5514a120bb4e3c6ef4e2fd199fbf7f2e030ed2188d02c4a9b96b26b886fbc8a1064b7b8d7780c96e445486f6f9c85eb6f38ac4eafefa5ec7fda18c452a61c5d3c7e4871f7668fbdc3597eeddc509186cf7f28b15b6d4e5557c9ab253b9abcc87b085fee4b34e7c596016d5679395a57439aab4046e99b2b4c2f97e00ec3898bb53c2c3adaf2af5bcb97249f64f4a0f2c6baa9b76c616b412c892ab7888d1a31507269dbe5eeb3c3097d107e8d817d8ca88958d195be3c017629a9aa1093bd05f6973142116510a82afc70e74643498e095b93d790ae0f346a49773140bb622d936568b2d235f2af0ab8cabad55c74e325600500294e31d800ccdefec76e5fb1d150fa762e62df1514309c3d32f969b839479aec61126996fe74eb624c7b85e70dc133beac25ef908a3ddd3cd3ae93af1776a32211be7d6a497a59b044aa706a58842841d28c6e0163b8672652de63034762459079586c8763f7979c974b90945e9a40428ba4960b21cd984ca5cef3d05493c957dff3d4d80274bc1b823180524211ff4e9e2a93454ad69d36178d546028b3e6ff05305e63f5f571be03f9e34754f7bf21c9520049da6248146e79653ece07bc79a75e32f05298afe859b9169772a11648738949834f6fb89486a4b4c773c585303b3d2a3b965fe1f01222850494f33544abb4e8ba10fcc934d92d5b88b84caff3a3dafc895f90bc97dd18eea76edf1b82105a9638274f18ae475367726ea87ea50f2e982b155ccee93fc7db34917111ce0e653b04e3419fdc866db3443d7f935eed1b330d6aab92bafaa446cbdced68886635975c7620665b5acf082664b1c1133e186e22847309491cb4a71864818451456d2f4bd583c921889f4e70d54bbbd922a7ef21a1d42920ac625914450c5c90cfdc9ab92d4ae41ba8182cef8afe60af3e3417032f639aefec33ea80ee7135de6584ee11bd64d34e1e9580a2b67da91a8f17b76803759773bf2b41e0472df5f7ae9f23c901cfef2911a4005a321de16d321eb495a2d75fc76800306a03a0005022da88f5d2caff46e4b3254bcf4eaaa1a6170615333ba441c1f36eabfb121885e2679df5f6700f4a295a958720c7a0a1305c5c0c61d0f9294204695e09afea901a1fd6c3279634152c7955d4802558b27c0da9955e5a82e097f89b56b996327584dfca3dc6255678177f976c2be1ed81d6a80d9829552f3dc9ba80e9776f37ff861d3d725310b04c42866ce06fff6de563bef41dc0b0f615ad0e864c3208fa67ff0248696f8f110cdf4001609ae82e6e5f4d46d43376fb28c628727563b330332b9c458acb8689edce5f4721f32401bf36d21c420944f17a89af39ef3d06b024bf1522d925abb23d42b30b96740075d5fb8367264dcddb716aa206427c215c7f87c563ff6c401d6754cc70592dfaaf1580813e7efb4478f340c80a7a338e606403b650d0778b5012cb37323cb3b79bcfe41567f08ea65868f33fe218284710243a89efab7c2a757fde06cbdd138ed015cd445b6d2309865647b18dead7c57a046764c7ca82279f6c0de38143935999e640715929ce72bd3380f617063b47640dec6ce034e732036691212cef81f614371e1e4842df2209e0041dbafe5171cd7c5a9ec3d76f509d8c836052b3cbd567e783321fa305023a0ba1160bee4df3709493e6a9cd0499d255f7de4ed72734c67e4b99beca0dc4dfa6a26567abb37775571c661de1c5d2768a19c8100f2af8dfe2dc9e46c4bd5edc6e9f9bc74092c09145b2864c847121e9838987819130dcc09ab39ed88352f73ff99b4f4d5eca63c9049a6e92fbe3de828788d16ac0e7ec98ff8bbb1e64461f0f0f3e0d17795ab9af3a5f07ee79b07dcf7a1cf39a142619a44232ef1f9272cbf1dd700e70cf8d23ef02f0464a3e2812506b096cfd5d397267201b7d7a0af63679515f6c9f7c65bbef7c4dde674f99ddcce68e267d47cdebe8a46a38694205d05b556afa7f368f7c862e56f4e16fd91347366959f24b23ba24398a04341221e23135751eb70c59fe4aecb74d6fd5c86b7a518b487237d03b85473ca18ec31223d79c0078b7c6365f344c9b891c11eabe01222d0f45d79b116ce9160073dea2cbe82388901452082550def514f7a643ce5babaea10c5238c13ef092f96a700b6c4aafac0bfcf544710ffc26f9199419ece4fe48d2713082dc130fd6b6b0ac40e5591c36b2b0a7c7a8114814ae943410084c41b239939b79d08f9acdc63e2c379bef3a1c1346063582892c1796ee7bd290234699e057aeca2c397f842ec53572a105912303e730dba9e66ad67c4df1964649348891a94333f17bc391b5def5f5f246b026603ea58ede00233e59d3d56c7b40295c36d792c56f824372b25204695f699ee7f744ca10adbe9b9e51cec649b14e4f18f6525a65e3d48b6e10673e58859efb47925ebd7f444961b41cd675f5158a68cd3d6839bc4a86426ad3cbeb43e49e153fe80da749589db787d9d7e33f30486b83eb53d027601cd40104b80cb88dda0cb1ba8f5a55a965d2e73cc66f19ddc2327dfae3143a1aef5b85e5c32768f9938763b08e24b808332f65f498867eb76f62d446b1eba0a78aedd65b734182ec66ebed898a366c1b2642210a5aaf4e111f78b1ada476e3062d3ccaf01a41731289ce95e74f22028330d3ee272aa91405389e729dc4df1d64996225f4e0940095558731a00af3fcd33bcadb702f9f63b56c53b3b07464bf232033024dec56a15e58c027dd0664c6b4728299bce08a16b9ca630bd5447e4c77cdda09185cb4fcb312adbba872c80645602269d550011c156c2d21c4ea1c9967f8a3aa1d6eec46506af5633c63f7a63278ed474c33a4fe8b1b076f323331517d9217bbbbfc09d57075bd8a3af7adce725cc42170ea706822df554533e26f85daf0927465ffd882e179d2bb35b119736e577ae4a1f7add57a1bc096a988194614e1493fe9d34b4266daf802f8a8ca10f1868ff2de01b71fde98059ce9dbb307ab0bb94b8b8a561b98b0cb74aea2f8e7f3024435e494342e5800d2a10727c1fe2593178a9ec36b8e6d116f4133359c872ebcbe10ba28f09c5ce717c0d54b84d48c7df99109ac572b52ef7866f9c6b9f7485f37d9f0c9cef6c4a4f2b08f7bc080f023f6b15ef2633b2c5aed76e306102822e2a4465709e30b45f7ab3f54fba6b9721901d838cb55f352d5828d607a68fa998b26fd8df2cb679689c72c4adf39573885eb9f99409d04681a02feb40c43df101930797a8235cb23cf8eb3dc855d91a30dbad498bf3306072e16f793e161a3cf4ca4bf5adbf4fe1d5a3700136f7d63f9b0c24eb08d3b92738f5ba8a440d171d3dc791317cd028b8ad26ed366c8d03a2dd59784aaeaba44f9eb49b02c34216c6d7df2e601ea9433dddb3eb657c2dd03d74e8829f90bfd2db1ef74932f2bdfca3144f90c23154222eddff5b6032ed644120c9309840bbbecf348c4914b0ba7affaceaf03eba8fa684adba1260b60a9c014852a27f4323cd170933ae9ffb18e53c1d4022ddbf8066863badd7b4bb21384c195089936eb1a8860cd294b4a58e889f54ce481f7d83f1b5fa6894301c5399c2adc9d64e9e49419c056b1a422af95edc9bb1fa870236756cedb15d8333248cbacea2248c63f7ef8ddc17b3736a49ba2f1c567903499cb5872244fdbd1b07ad99c72e6b21e4722556902bd73741b15afecd6f80e72558bc6ad7afe8debd5a24f03fb88350f11a282f1486c99cb14874296f1f7186f2b52dd145f207da28bca0c5d0ff258e5da6d85bda096647771363b6b42232a21a6e1774982861e2b3861f4bb7a84e2ef6e67b90dd5d2ee5ecd3fd7ca920f611b4b2b9a7508d5be7d0e1342bba41a2a8e41b4832906505fc904589cc268bb0ebc286094e253343201c1bfa3e6d95e90f137867389c30c00b0d83942317fb5b2c22777776f789e0e86cf2d7507eeddfe2e5f03920ad81d7309cbcc71fb52a68e3ea8db68cec317311ff3209601c06c7eaad35e83b1bc4208ee435a6bae41207952b94ac4e07900d032dd5e0dcc03ada05b8a8d2e2df4b1a0564abb1464b37074b4e9aec8df303ef852ad625e35d866915f1f69e3e0a069a28a2fa4b268346502b744ecc642800c392f28a62a4051d68fc7a2215a0b2b46c46f143f9958f1cf5d34ead88adfe4b0b9d3e4e53ffc2d80d3b76d3954f6953b2a6efcba35c1348d9cbfe1e9e29b6cb949a72f076dad5216aa5bd5801575ceb901e2ae6a70c0ae9a1c152285926e67ccb81296082feb5a92b41ab956227456f6635dd19be0f8efe581b6436a74437f890f2f971c4b5ec47949ce7e147ab02419d90a3e6f2833a6f2c99718c74e6dac0e28e3b38bd107158a9ac06b7a5bfbf9ad06f2ae46f27a13ee4866b14bb23e8f378dcb01d81c00a6ea57546d31bb9209c44b291b67434ab08595789a95ecd4a747b3758fe6d5e102285a5959037f1f80d46197e89b3c195580e6b4b67638cf0688ace4c2fb419c8a8d3b42363dca87cdb73", 0x1000}, {&(0x7f0000001b80)="ba7ffb7e21b2992fa938e4b072884d9edcc0c4fb3dd945730318d9d6824c4f994d206e42c03394333e6cfe52316f0114bbe3159699cbe5274db3af806845e3e619e6f947a85d5aeb29474a64c6b8dbcaab780b3077ff682a83342f4dc342958d163721e84b46afc209fa50a7511abbfd6575b7dc2c4f01e0c785a266dd7dc6f7ee6dd5e359484ea08997395d286d71d812adc5dd1811b5babf054cdfbc72d4c505e49c22446b320f06caf302ba", 0xad}, {&(0x7f0000001c40)="22ddbd8b4df8ffd24c5854a9ff865f444099bb669ac8edbd4912420185b1a56806f3228a", 0x24}, {&(0x7f0000001c80)="c3c90c4e22a418f31f1d238879056f324b1c23236c1f454c88eacfc85c42bca033a27e5010f66f03f3e9992ccf3dfe48cfb1e3398adea003bc8a7ab9d684d95b6b128983feb5d733", 0x48}, {&(0x7f0000001d00)="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", 0x1000}, {&(0x7f0000002d00)="b2984cc5330b92017aa431a0d1351c0bc85165c2a08d516f363668bc6e9f205c33b80c2865d44b039f010447e163c17a476c16b7cb1d7aa311d2e9952f24b542e3b3ae851f74166758d57261565967519be5f731dbc2eae3ae883dacf13f3cf410afd59c02c7dadd9d378c9d20b418865b73df9039fe3ac64bd3f6", 0x7b}, {&(0x7f0000002d80)="ffa4f497ccc1a9e161a8ec718d5ace0ae4c91c93d83dd1303baded81a4dadc8385205c4a2ea0d6334a6ea95184f2d8cabbfee49ace528d3ae55e0399882203f7957cb07e0386f3613eda3b4638f7a85558ac5f0f12907c6ab31dc29a7d2a54779a073562c7df4969173c7285c034f7a3aee8", 0x72}, {&(0x7f0000002e00)="64f39bc9cdd2fc7934bf6f75d63750842c78e08535ead1f1a0ed63071e768686f78968758c2365900d5745a7d7f2ace8093f634eb40b92a6498587a8e8b9a527bd58e773ecfe0e55ec1c733a3c864ab18bc01576c019bfce1f1d7826386f8c7c4133860127bd683811ee9bed4be5a99c45eb2f3d40fb7ae99b307293d7c9ea06eb52369c", 0x84}, {&(0x7f0000002ec0)="237c9b98fd8eb362b8de0210e0c61e2493c10d803d46e2b144980c02c06437855bf1fde5e91a6f5a88cc4efe1515ba6c0ced8313f1ada79e493b8896e2f19523fd4e9ecf676c591fe3c1806466168ca704f2f3f2441a2b26922966788ab000ffad5b7bcb0052f67d4462a7228db2fb9f8de084777ec18d2f421cd8035a8bafddcc7dcc44db2284958f4ed04b6b64d70d0f49297c546f76e11cdc9c3af9544ade24f2e053e9657efb010b0cd328791045c1b802b4771c76f5f4aa8a59bb080785fd2ba4fa89238f2eeeb5dbcfea49d59be3bb3290b948018c527a4798bf7a403c3967e13af4d9d0bb51af4dc5887bcbef0809460ba6b59d4b6b3cd23d9e73766336583a50cfc78fd6126cbf9d3a3bba7e6e05e05d1244fbc91a83fc7cb3f19908bac3e6c3c321fa9037640d23691939a9e6b24b65378500678b638e39e2c39df819fd2cc008025d7c3a4b0262747f2821c01d03b756c3df39b01dbfbb2ab2ea82fd4865f39639b2f7e83c0ac82077228d597c665f951de6ceba1692e3d07b33a07969640a97da0cbbd01950237204dd34cfa5478743c0bc52e81c88b6a96efd5f301240bff805ee79670f3dda15349b83d6cd4838004874908b7d76bff0eb148d6f16309dbcad7e3dd53d14a2962d8ec8baf4cf53e3584c1493e251a49cbd464ed0a32ba867f19985b9cb5acdcda94b32dc27cbe8596a5f56b3db17c252abe15cfc5f4feee298628654ab9f21f1aa051dacbcdfe339886cb7936b53328a384a0f6b8a781b99988fac54db99723ccdb16828d83c0dfb32ae76d26aea0e4a278171bad54d38b01d2e9cad7793cb79de3e87934970c097d1ec63678d829f1befa64c9e5cb6004609269717b22d9f8149d77d440ac9a33a78eaf790f53fcb2c57fc7d7f5661507a05776e9a0915a7f88be73f8efc7d56b83e7855f758b032140827db826e75aff39de0a0146881efcd36160252230485d9232c80a3ce87c78b153449de5198488bf6c5b9f232a00471ec8aa16ef48dae5f49dcc15aad416f2e450a5a458639aa7567eedb62642dbc0973ca5598f91f7f18ddd2b5615605532118887024bd7ab44ed7656162bfaf403c62f1a315fe14c70a588e5631df055a29f930024951b66906c8b75b6d6f3a3e7c5fd32dcb9d1a32639a25e2279c7358ec7d09ebd0091231e6cbeeff26202f738a1616897b01e0f4ee4e699ad87fb4323ef04175dfce99408727a7ffd0272abcdbd56e14517eb9c84541d3401b132fe0911b5291412acd8cc43409225b9d18a9e46601e330cabc99d57b6c02d22842f76b9683013dbabc855815bbb3a1fabb25b23d2ae8f98525cb72d3d690bdd323aca1b7b8134bb7179abe8c1a15bdae96a83eaea28dc545b12d6572c480d08516717fa58d040ad2fe25896b05acdaabd0b3730b7ada008c0e7c6b32b9d6f8ea1bd72b07d3fa67d9b91785065639c59f311a88bc9b5f3d6cf67afdc368f1ded87f9f2c50ef60b9459cd0748896639445819b88b8c1eaf718a599c153dc4b3dbe14d6fcc2aea3d1f6468223fc20dfad8169410238afe6129bf16c9b4522a2db3de2811f6c7213e9cbefc28c50d5bd4578a1a6dc440dee31bfb1d2c8f4de3b6a2459b5f525e4d99eca995361d5ee281bb4866cae43837a697e38c9bf72abdc8c46ac62d065d7bbb87d036db70317197a65f4bbd5a91d174aae7a545645792240249ad6145989c844af866cd5986bed43ea73a5f57835fd1e145a5112a983ab0afc79c3003b2c22e427952b32dde05f89e52d0ffc67e51b008729b66402c1fd058bdde5bb9ae7fc48753b02194bd2cd3f79dae80d410a261e6b5e933bb287fa084d67bd2fbc0679b0d6b58271c37d5b247fdcf08cb7f15e5547f4fb1a5149f011d5b4b0e19313077130c31a01af2f3eaf6b7a1e4ac717479df0765e5ff5b28235b3d58b598ba8d3a38d50404401a684628a7e1ee4100f8712fd92f91b1aa7069d4ad3cba00c475740e729b89b804f4baaa562d515c853af76b9fcfdee87b715c48f0d73e9b72e53837caf1e94ae72d2fcbcb93778e7ef53bc9971f1bb209ef0992e9732ac171efde5e4ee027bfe4549496be176ac826ddb47fd78ccada8d9860173cb05c0470a7728eca11f861ccbde4822a55d29011e5ceda0c06ba69fdfb287ccdc98a5806822d6bd0d81cc1fb563f7c1b09022e583e0826e41aed5efdb90a163257ca0c65555dd35051c1f55c744a89ef5a56bd24acbbf62031bf435434de03af05c9619bbfc30546c7d671ffe249be28927bc5c6d13937fac2e4dbb862729ca42a6251ec27e205607fb64b62f772167cd5e48f4eae64099084e03acf3855de12aaa6ed471c9cdaece0681b17e3b4b1fe65b8361f63e6fe581ea0b78cb8c0abe7c5f98c46c25a6bd3b1ffa0e6765972ed10fac999e41ef75e84a63b6504d0fde3ed9a3ebfbd81eab5cfe4290dee3683ad47377ba0550bc96b7b7f65939af6ea320d69b905b0ca5e150daa19bd1f53b88df7a4843c274f560b5619132f85825f58576c301bdd7daf00d786fbeb859177c88b242c397b2d1511164c74541f6889198c5e9acaec78f09db164740dd1f7b15091bf5d5c3746a388718c5a200d1402262f6e197f42ef2558d36f8d494cd320e49edc37b34bc845a0bd080291c04b079c745c2a358b688cf81c5792089c5a103b350e83044e0e97ee943aeebb037c48824fd1b4e6e9bbcf51b79118007170439d2b6616032c610c2aae857cba28f10ffcfc8ee9668676e33ff839a3bb67af885ddc626af0b0a151c1b9b15ac919d186cba2a9b546d41cf3fb52c4c0a3bb2d88efd22e9b2730dd6b1a57719e9977b2e3c057480be114538e64e523846a5e455d179369fef40d2c5a2de3e6159b1968548fbc832769745f0a47e4a0f0304f414df2cfd5eb35479704ce2c9980dae5188afaf34c961c07c97c0538c620c8f8b61690744485787f5c508d588bf20c7de92461bc963ff4dec600b570e34918149f4e6808bf7fff4e1cfb2c034d5d8871c9a0fa7ef6d2c9d0b7991dcd7f0358c14c5610ae92b4584db25ca7e57b555b02b29c77f53173d862216ef9b0998753059d6ba2e90d065192dfdc01010af55cde852f59668cf1d5c631b7d40110855f03d729a278b245caafce71a614d3e2063e0453a2b02e5e82d2b601d1880524524b304e6cb021f853baddbd78db8d93f90989302396cf75a7c40bca4b727299724e29a159789d676fd812ab9d05aca03d3b0a3d13011fa0c14e78f01c2d84dc8be48c55657a761d0b886bad9efe2015f5114d352b8d0e9598c7325cc4a245a76f1178c5d2226eecfb17d134e774ae69cbcfd2f8240a3d5a3632dd616e277249016026671c1630d2573424c166ce9402de9a63f795c438db4d7ced2dd2b2ff38e319e9822c1e9b205df6f5c8bf6a31d312b14a55e26f395d90c13e400e0c59892752b4032e27429dbb2f05a9e0761ab9947707b38b01027c5940b828bf608e44323fff69be25ae304d9e1bd264dc03a2559a0b739dfe92f7d1333cc68e0db6dc7e604e4f88b133329c817aa4a60c66c027ce83b29e4e6508e21f7a2f7519f39e15794d265b99bcc29218c02668d0ff3cb2735e26add86203fde6bb42a3d6b95817ecb35809856c006162a03ab9dd785de65d6b47f81f2fcce1287c670063ced3c112aa2d075a1825c666224ca44630ef1f21f5392d1a2e50014e96362a1af918c8111cfa8b8df93167629cfb55543d0d5279b4a623af3daa56b64e7cb607ced4521fd856b77baf7e22e471ab5a7c33ca1dfba4d47578b4b7282762faf1858afadbd8d7eada36e4b1dcfd21bba899fe65f7107725bfb467476c713fcb2ac3cf22de33b57fcc4a7101ba664be43c0cce06b60bd0e9d8b5086810f537399fe3df5c7391f02c1230b2eb35939fd4ac095311df30fcc644ba251b94bdf064654f93c9c5c53a26ab9b44b6abb1eb7b30700f406c9a98968cd88b8298d3d0942789565e30999cf0af502e3ca3cc68616787b8bf962c40660837d3eee3177471c2bef1ca9926abd7f81a078377cee5f5329df7c7dd4a52cdb3c6dfcfe9d2307dcf26dfb32d48d34eb1ba819e2813fa334bd6bb3643c24e2ffbab3eba8fd062b918ea30c8e1decf1a20a9cc3922b253ed7ad62db3e59f5503e3b60148355531465da013a2db96c17706e465afdef95c5a7fafef56cabec0fbe517912ae4aa6e8fd31ae30fc62d77933bf096be8b91429699bed69dbd422b4b340515ce7ea7941e972b35a120af9e0d0873d5666f06cde693d1c6f21dbdf7d28b5b8e43bc63d3add0f5827a6493341afd9757d03aaa67d0ea70093830dd88c537ae179e0763eaaaebcec441806c0456cc2b18d910a4a635702b3babe84c0d3aff32480f6fd082e66f1e54372fe46bc9174b6a70705dcc2a8e297f29991ce93a166d22e992f1fe6b0f362c0d311a60be57609971d8ba08994ebe5382268b7f712723be8f84d356ae09f52ed322f71a57b557ab901d201b1c86913817165d26b7395066bd51af19644139a9eed68fcc5c6dfbebc7ae57a1e58c8e8f32d4d0dfee91353466ee653f866578b8b767d7a95c89de58f88d81a5b3d4102835798ad3ab32699aed64ca0df8ae588328bd85a8e2b6e37338b2f042ee8adaf5539cd5840385bd3afd8dc1f1cf7c1ecc92dae5a8d209700d6b40de2f8c37df6b898adbc8f3df54deb4516a7582a4a992d76be64d450fb8bfc204434826a7a9d58a5d6155ed0bd49329de57de46295f87af4de8682f6ba22d7d930fa52effb22033782caab0834c570f2e60c2216a11e334eed34384c56b13ceab8e7d2edb1e8688a7c9b0fd96e2f32245b94e2022a51c941bc38c2ed15550524bed44be25c2b4c4ff636d229f89369eb781a1dddb886bc14db2352ed130e3ee7c47945bf248f17739395d80233dbbd5a9eec5710c5c41bc8ba82f919912d35c7ae8a87b5d10af0c79b60794f7c898d8d8e03abe9e04d91a1448a4f444fea2cdafc8a788cecc1c78c802998ca8c82ba89de436a08eae8dd0ea6e4c9af7eb5d09f6ea1c716f6b7597519be18de99aaaf205af5e02a71aef31a7027ef4e476136a5594010f417b3740299731814a25772e79a851ef51dd4b0639eb6e5e60d13af2209c4e6217e041a56d35caf38af9f5d9e176ad8624723c84c6ac479847db2c91a98641bc91635a240277987b32dcf92b22962958edaf5006f4ac107d18afcc13d6fbfece5b5e50f4d028fe7b512954c032ced3a3cc7a09d4a96b2c747df9f9a6fc73bc30075aa1f4ee26ec4b8bf42a86e06aa293821e56329199e7b4f0bcaf948fa288143f6fee68380b2956b55792583fc186b2608bf3d203941dbcfc9358a608f40cc14fc62bff774affde54bbac046cb92cf8b278aaf308946f0788949fd9f04fd9b33f1dd162a1ca4cddc02c424b7f366071ea2812ed7efae87b5c32932873ab533212cf5068bc7abda16e8f637824638caf67d4a3f4d5c289f864bd6e2a1ecc86ecca4720e7dbbdfee40b9bdeb8c4225bba80e4831c9b0607c473885536a810f2d5558ffbb7608fa026ed269f7e0c1f18f656344ab60a5fbca823e2af0d6e7abcc0f2c329ad684a892c41bbc99a6bb532181de30d9eed48586a2d7ea6f7cfd7fdc355fcad71f1441bbfc0d5092817bea51651fa8f90d831abb1a6afc2c6055d998da208a70dfc42878ea7f3def54dddd2aab94bf40a3bb429faac15b9ee45748fbc851540e33560c6ad4623320037bad1d849bb9769b1ac69d11f38aa284bf1051f41b3efe42c56248235446a39b8c5c", 0x1000}, {&(0x7f0000003ec0)="0ca6d1ad15be5f09388bd2427a1cd9299248c93769fd033f51b7c18be69f146fbe974a1517ef2a0114d0340dbec5b6b844d7bf77f5f22b090560c1e456d158b58281b461858e6df68a5d5a2d093cb16067be4b87c83e16f1e8a6ae6062399f044b1a2c9df84949cf080e5120d2e5a719d84645d4bd0f6cdab1118a5c06a0e9e4dc96398d698f9fd7cadfa36aa175a086f886ac4a84bd3642358886e6d5e12459281742e48ec638aed66b2be696b4689ac1e920860bcee8eafcae56c2ea6872d021f9baa1ccfa02e6407b5e14c9c2df91a40c4332a3f7b2400d5ecbd19285c369ef9ea5e61e534a73fda2e83f3ead922ebb08580ade7f5c", 0xf7}], 0xa, &(0x7f00000041c0)=[@sndrcv={0x30, 0x84, 0x1, {0x20, 0x2, 0x1, 0xff, 0x2, 0x6, 0x8, 0x10000, r5}}, @authinfo={0x18, 0x84, 0x6, {0x1ff}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @multicast1}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0xa7db, 0x0, 0x2, 0x80000000, 0x6, 0x7ff, 0x1, r6}}], 0x98, 0x1}, {&(0x7f0000004280)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000008540)=[{&(0x7f00000042c0)="3648d9054dc04b87a8cdf82a93529d89f162d8bace9d978e64ce09029bb1a3d79d6834652184b6fdfa752ad440aceab0c47fc2ea9fbce9d3370c925752b0b7ad1b74ec659cabe0229db416440934fe00375c22c974de91f1233d9fa0ca711d884bbb8779aeffbbd4ec1da233fa908a6ee2df24f0f8d435acc7a4c020421e9a3f6b3baf597f3addf1b322435b538e67514e1adb4a559da008a51c1dbb9f2aa373cbf9dc558674815b7515aef8f77789ee30a8ca0b27c1812225c2c71932be757f41eb", 0xc2}, {&(0x7f00000043c0)="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", 0x1000}, {&(0x7f00000053c0)="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", 0x1000}, {&(0x7f00000063c0)="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", 0x1000}, {&(0x7f00000073c0)="2073a7aa06732561402c1a4e13e61ef5f7aa5f096b8db41a1c13ec5a284350a739ad4c7c236f99dbf6f19fea4e1822ca1d296c2937a879025ef0a1d3017163155bbfab70064297a5379de3bcfb5be851288bdb88c62d54bc3beaba1e594b1254c5941c65bfa935f9462d4f8c", 0x6c}, {&(0x7f0000007440)="14a32d18c9f5dcf0013052661167f9deb2d1c5a3288dca6c6a7debc489d06926b70f88dc3f7ac90e0296c07901d8f0241bb43d44fe48f19c47ca90eca355cc881c7726cfda33f7e2d1633295416b2b00869d22a0d947bb81fe2347aa6c2afbd36e7b2544bf21395f03c012e5fbc7e3436c417d72cbbcdec62467c72adfb2564ef1e2d538e37b3205a5d86e7672874fcf115819d0ca90b7956919f4ce68c0915e05ba6a02725dcf4a7a919be3c6f40dec968463ee3c2e75392085c857e584d677579b2090350fc79bd476a165561fe6f7ca6a6dee72b2920241ab06b3631258a539fe1cad0165f2690e7ae7e864661f89598530f51f7075c30020edcbbd67c4d7407ca6e52eb61cf2a86bfaf0050031a6dc64a559119325098f76be981aeae955d6d426c5e575676f2143f515d8be80a12ce1c6efa4530ff374d44c6bf71a8d29cb0a9b922a5922c0dfc0b7685b98b4b71b1c336be5a2b4489f31e53c7116271c401254160cac79a9cda2781e802c51ec76d958df89631104f2e9e7926d3e7749f204cbf74201f14342afae7e76c20f7de66fa4cc7de5afce88fe3d92fb6e6539ad47082e0c1ee914e1f0b3c2b70d72cf6d4bcc2ff3d855edfde0b455ed3b0ee441148a7a926c7447e15776331dd86589890664b353c859f4ce648c7d1fb85382eb95dea616521ba97a83482c3ceb84c5c6aca6c6b3748a54aa3a9436fc4b85158003e43961ac248fe0130d48f300b86c10eec823089e4ff8e9990be53e1e23fcc305d0ce90b90d27677f1792998c4efeb0968097cb270d0ca7be27b21133a6d1cab7bd4fb5d2a8cc2f5e8e6ac4432de1ee60270051d38e1c070d104402e6ecc85a4834fd61c293b678f197f6a36af5d9ed05b57da4d719e427b96601eeea5309fbfeb597595372149ab263e86a5e6292fe3049c940349e390ed39b52d4434a2cf50d3f7eff74c78032ba937ffd276febd7cfe8e176c7a0e738299b1fecb2e0e04a92908c502d3759ad0fc6b01cd07f7a25bf875637713399aea98256e67327576b5f3f472f86ceffcd3cdbfe046f8764db0565a937cde884c26f51b0eccd4a8a8031af182482bf04e5461e5b2b0a371b99e4f12167d6e64515a86bf3ccca781008307ffd33d03a246e8afe62052515ee6631f3428123bb4fd26e337ba4f23287fdcc4381fcbe901b868ea78b1831bc0057fbadddbf2b95a8ed1d2a4cd2891a6e5d954556b66dc6368801fd1644348cc82d00a1469186cb222d378ab2e18cc0cbae13cb9af20b473a281ccf3ec06e8c7febc2ee5aea6947e6e9e71e5a03f7872e9d9ac2732363f47efac63bf7ea88fa664828782421b4bc66b117f705952543affd2be5f48eef716e8ab0481c4c3e9f56baa3711af061312a4395a233ee931a717ef1b7ca5829b575485d28f918f5f00dc60f2bbd2cde5457fd0acfd76d69a834ace33471c721e1ca75763109bd5f9cb7d64d60a3f1796fbce59a9b0b9739ee7930245e848ddc1dc89c8bdb88cc325301176ce4d2c68dc40889fa081d1a58a8018345d809959dcc36d21b9a6f6728b8f834a393f6f687123b561bc5a3d79d463d033c340e89e4bb75bbfa651d4d8af62b5c26b84ef50565b0d094e73c34683150cdfdcf32ff9eae33a244c9243f2f8a70622eaa96c20017eef94fcee07266405637a912a42d933576457851e39e31d9758fc49a1347b17ffb8b0a0a3eded65154ae7d26dae6b56a3558490e9a708aff30b5b3a88acca7d39927f1b236069f489b55703acb6e6276ccdda67e0c92512619a2c8bbf7fef662c348e4b0fd3c6321e51b068e2b31f45f8611918acdfedc54800494c5aa3967081af410961ebc9e3fe74966d9b0d029d31dccab4ab7dc17b31439b77a96f6c075cc711ee1c2fbf389bf6156b41458958c924564f80c8ca2bc8306e9ee10d67e228fa523cc863db1b33829e3bcb779b58cf8817477f0ae0eb9e021f55d9ce57029d01e27ee32e7c59afe5bdb24ec1e2f29d33acff6ec6149569781c0405055bbed81a1d6c06e1671b7883da5b0a755521b9e7da0dbe7122e679751e486d2cfc23b22936fc5246cb99f370bd51b51810de808fd88204f726a9f7e544fc3b761b1d7976de2fbef273056ad43804e9b9513e1fbb5f62f72a5921f345d43ca2534b5495fb3fb0181041980c3b3643bde5af3745c8a84dc9b8536c96a0e942aafe0ee5a109d09961ff2418c52abe988539aabd592ca3c2de25c5bf4fa8abb81ca12025316b26edf394bf6893206f081d3bfac36be2a9a17fab7ec0150ce8d13e0f2adec8a9c143b667635d768673b5bb631b8489705d72d8ae6da6889858a87ad31e87171931c7f0f299c88ea04807aeb790238c55bfaafba643bc7b26b40aeea79e337b2ce42ed1145094bd9dd5acad6ee22f2bf9c3c452796ce6aeb2bd19ca62e688e71ba4244b285586b6ad386f210b68a38f71df98d12af63e4fb5dc3231057e7bdb89ce5c555b7a3bb6c7c2382c3550fe57adc37063b1fb2a0b8dbee17109bad01db4b84d7a2d9e5e956dd70e7f7b8692c8fd705df9fb3de8f0f884e78838fdaef006795c2ba72d78b78e8346e11654a24b25aaba406aaf1714105547355fa6e44fd837d723482a4f6496ac586ef2c88ce30bd307b718b710f2bfac1e880c921707fa3da97545dd9d11c565db845d45134fe1b26e13942cbb5dbfd2ce6941d39d23ca89bf5e92826c2b2f05f3a57d704053e1dded45b26ddb1c1a27f1670aceecfaae43dbcaaadedfa28081f54067f05757c17c74f79b4028d51c3cc6aa05410b298e369c283d9490794cfe888155bbb610fe53232f2c13f398d5f3123d780df5b561e0b2b74d84a613fd781af423f81bbf88793d2269f0d3b3d2dbd74d87f439086509da51dadd73ade5e8c956c63b64c7e7c266ce9d0407d3b3a6442b7baf48cc0fe9c294c5952159ae5a3a0f99177e2ec8988e435251155e0c7aceccfc33de29295569bcb37019eb4c154ef0968dc6afaf3b3ef18c6a1d8548d35ebbba476e8822cbeb2808a0b34c38f369f42733e7efa037f751d8a2744e0b0810d98332f62d207b246d47ace1d61c585808040f3cc9d78d57e52441c204d6d71294c592a1bb8adfc171f52af10b7b22352d51ce3adf944fc387396ae3dc9b51c0047b46b8f1291532dc6af8b6bf48d1e829b589da8b76f10f3a95d41d38c1e5696bafdcd2cf42c65415c8f49293e0dd91d9cdab9a5b650cec58fb0a0fccd80856c28257734893b74a41730eae71997f79463fa71032dc296c43cec17c366affa32c4d5f12807c1c0d8f1423caa50c22d74f941f2eca9b98bafd9af3d4d735e08b3f7e14f307ed24edd9bd9e07ed2034a6f42dea8b7bfc99c91bb7ed8ba7aa3d8648ab76ab8b67fcb55c8fdb0f7b6c4742ca425d105c0870b5e655e1a1bbd1107ba2f1c623ee58fc63ae7f4169f2c141e9372e358e2bc7dabb9f1c5ec1023b539da7aef84f04f1aeb0900f73b668a12f46055d5285bd9e9286da39162da0b789aa41cf78c6250d3dc50964d68ca94266e62d598e869ab39728c70916567682173b39fd52bd9505365f91bcf20f4c3ec59ae6dbf030c49d200c1683a400bcbbe234aca8baa638af40d79727daac905edd48cec2e9bf44c508bee5819bd3caae50298e973ac0ae696851a9d86f4ac924e380f8e7f36000e39f3b399317cca0a82e505f5d99c490bb4e5008823117c25f50e4bf3799c48b812a4747ca9151dab907822ef856f2f085c6fba3e92b8b618063945c74103e934dcebb426087aec321a072be798b191035db158b7b773b40060b1014ba7ff4fc76e73fb60f94af667d801ee56afc6ea77131976f0f364a1d177a44343575a7fe4030903d0a1d08ff4bffdb005cbbdaa87989ca8f8afc6256a4218dc175a768765d049f9dbbd91497b1534079605fbba715d8047073fafc62ceda1f4f393a1c85226d2b73e38ef6d613415a60897dbbcb945ea2013174af8bdef10f967ad38a3a8872c811021bb747e21ee1b4057bead859f7d519ee484b2c9c8679ef0861b6479f78a2e77df5981cbe9e4f30d5bac2a2c737b5043e35abad7e4a081dfaf7f539ad97975b0281fdefcaa6137706bae26842cb6bba566902eb5a325db1c61889cf19f21aca656551e661239fd1bb96a0baaf5b5ddf763b3cbae5f8f006dda855b4b8f0c8a07f505e7130914a9e39ad87e21154b0fd441771dfab14843ccff6786b414a4d4f4c8addf44aadc2ffaae0f10feaf59d2018199865468eca1d5d6d17d3293f7010712ca833772fc48f979995c162b0b30eef15dbd5e9aa8a6ebeee7b8381c17710cf34fd27c66c81ce37883f1e23d30d2ae799f798056946b7b31f2b4a5e1b38eb275f2567057932df1f40f897784d7c3ce78ec4f9bed83c4b428c169e7f82ceee2034becd33c7b07731b606cb8def1a5fd97d31d6d249852b21167f6fd2d34e38a83ee2678fb2e6a0c89120948a752ecf25bf124ccd1364d650b5ffa760f1b0fd463a33b13b73b0e4fc96b6f3277b9bf329a02e86d9f21c77d51b978449ea84f0e732dbd4e936485da0a23900f309094ad18712adc215408227fe29090c58ac8b9e95f22ad73d337c83c2e6fe223cee367ad7fc5e67df0a371fe9744edea6480da7b6dcba15c94d33a8768d4dae3ebafb97ac7cae4e87447f0f9c961ca8a276b2a38e7c4965f88ff55b2d85fcb519308647194204a21a90c733df767f5ec4100747e0993397d079a3739db7a4c418aab3d789b5d998934ab88677b755ac07eb38060c16765cff519c9afe333c7673f342d91ca78da74306f9a15e4b3928a9630deed05355182cba0e98dcd203ce84e48fbd57bac1589f59617452dbb907528620daed07046baec77a523b9e599f461b9f358156c047b552c956b2ee567bca5309e8c1cced152922e232a7ce6ecc0eeeb32692e05a1ee154434595ebd6a89a541bdcdf76ed53e58c573d0a566bc4681302f4a1814c6d24ef09951d8200e03cf753abccce6d71f7b0b5cdc094139a2c85be38d471b2a305c02adc0e2b364e76ef2a4bf61dad4f99257e2c877ea76159afcada155e276dea255febd388c74702688d11250d9cb2651a3ba834ef6164ebe42820d055efc251fdc7008b70d0d434391bd07fcd2cf95d22e2421c392a165f16ca4dd1d20010e75e108b1671b4fdfd94c277c6447dea29014e71d07c7f1c25c45a97e67858ce6ee47d2dc427202ef7600beee2cec04a9b6e68a26cea43f6838f6dbf9fe6b5eca7ea1a0678da0ddc6e243bd3f45e8a97f82c948f6d7e6c45862a3c872aa89f26aa4453f8a207a1421a4796f218fa601d05821cd4762a764bd75989daef1c3400c8cbed0d2cb1c76d7555593d2852bcc01e19eba04c10b97c7c202103ca43985f9e7f95c16544ddfe2f1d7cf114b95af8fb6360dd150f2e4f57c1c0b16ea3efb2801b4d7c55807b001de54e60cc403554a156a912d2c1bb042538d3550d73757bbcac3a151c73be07ace99beefd9a6ba91f95a64d9dd92f1f8f2fc0c84d2e1bb44ddc227ed828d1dc8d11ba58ca2b37f8a0dcb93e111336de2e73ebebc9dae6888af0452de85fcb332c3d1c3b311a00393802580ad568eb48d9ab3795a4bc57638543e4d069c2865be1bb9569d61633a53e44850839a54071dfa10d587b71f5cdaee1cde2ca969705a884191cea7fb0bbd0a8dd30dab5c6262699f4febcea42ff6666f66fb02f31c8c1f83466d1f387e2d8332e18ab76411d79149aea83f89a6212e7609e8e929c83df8618f2c0b768b18280a23d9fd410ecece2440fd17ec83", 0x1000}, {&(0x7f0000008440)="906b8ebb7b8a3639e90284bf7c54ed74857d2c154e31310d9efe208ad6a43baebc6a4d3b1f80b78d4a0137af57d2c6279faa9300dda8d6b226050b04d71794a71a468d41795feb96bc6e5fa6da4d9bbf8a9ed8f9a3b8c47ebdfb6f199221df0c89cb6d85a3946bb8500f9668d5ba2b6987a0d49b4a727545dfc9110ec52370f12d37bb64d1f81f58bb752d1b5a4867796010983d8d572bc09774bd6271b034ecf9b89fea33e06a228c3acf96c2edeed53ae5f39a2ccda032bff85334e2f904dd6a1580ae4bd963288e7bd8d24de6dcf09634a0425c5583fb7d44d87d02fdce24996f2a952af31b4e88f390", 0xeb}], 0x7, &(0x7f00000085c0)=[@dstaddrv6={0x20, 0x84, 0x8, @loopback}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}], 0x58, 0x25}, {&(0x7f0000008640)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000008a40)=[{&(0x7f0000008680)="f122d3e8dbc6c5cc0912be475099a2eda486c4df2329ed8cb742f5b37e75e403e283c8caee3bbca83ecb223ef3f872e3cf80a6c3729bbb938d4ea1786b397137f67bf6aca6ac5bcfdb027284e3a688fa810caa8a81fec463a78c7039b5e71ec7f721a0092746ed239f7dcdbb4fdbb516190b3335b86fcca0", 0x78}, {&(0x7f0000008700)="ca0bcaad5dc4f52bdd8d56e85f380a8e66e39db6065f73d04d3a283ced7f7cc8cd0aec0ccd1b1e28df29e9371e71f141b4bfe2a7cdef9f63e6d19856c7621f858ac1a3343be68cdc82da414e0ba2252af6335d0600770eda98dea813d0e6451fa834c332b22503f1d63f12edc3f746c9a3164a40090a6c718f7b35c1bbebbd3175409fb675cb5297291474d40f234c4c9c34e62f7f97746940071344f2503bf448feb5aa797eed356d1fadd00fba2d4bde9da73d21fb4312f4d565c7d5d048effc3b340741b1f4c0a4da5e1e7f6678de0d0726b4", 0xd4}, {&(0x7f0000008800)="65f9316629afbd5088f0b1f8f4b92c8eaaa9ab0bd4689f5648da86f0069f7f856ca240d69dc0e9c61c784e50b95eedcb", 0x30}, {&(0x7f0000008840)="bc47e33466981b574d430c485bb19a3c343136fbf7952d3fdc416ecadd30ccbc53ba5ecc8c05933b908fa038d36f377592bef14adb79e1895b2c1942357e2df8e0", 0x41}, {&(0x7f00000095c0)="544dbd4625752c5a3f4752aff69c97721b863a8f70eb5d2b38a54f56411ac305d23fd8471ef7131c47902ba5d6d4dab2cd81af97b1760e", 0x37}, {&(0x7f0000008900)="69e2af17bbc0c82846f5efeb8fd8f3e01301e7c2baeb14e2813c7642840393f1ad19851642c174d5637393e0", 0x2c}, {&(0x7f0000008940)="7528fe08b6fafa309a2cae4b296902bd174ca9d345f73238dd324f4e97b989ef3b9048f31bfb6507abd120fa9fa51e411940bff73232c17b97d98953e59940f16eced398978cab950ac7506bf3e82247505adefd7fdb8c0c041071c13389de938ea4d4fc50d531d6de0354c9843a883e08584698030c396e7c78d3c7d7c27a7568b1cb80b762ea3dc6bb7b595787c2d8dd967e62b55e6f1896c8bd3e714524766b379cc4801df70c1e5887f3823a22861cd5a99755d4a2018269d845764ad1fc85e077932e9a40cda04ac453eb", 0xcd}], 0x7, 0x0, 0x0, 0x800}, {&(0x7f0000008ac0)=@in6={0xa, 0x4e20, 0x3b1, @loopback, 0x4}, 0x1c, &(0x7f0000008d80)=[{&(0x7f0000008b00)="2a2ad21cb475ba5450f264e0160a15de4277ba93dd2ccf552c56fc88e01c0926a54606a286a3b53bebcbae40c4d3b177ee5434d5744c92816a8f30b463ae1ed206c3620b201850051c023f47b2a3dfb84f79371a8781215304e9826eb5c4968f34cd6486755e8d7ba3a751b9f773a76e8e8cef2b343b25c0a5d250247b0940447803e47d9e376903f37cb64e10e3e62a09c5f16aed3739be7047c05cc15e2d71c8810451251e13bd9fe956b933184dac81f8d70c2e7b1d6d1b229f248b90e518769c5f1056afacf4e3a8b4848f2876a5cb00cb95d3205909dace51cc372ec1451ab3412801c8413332f1", 0xea}, {&(0x7f0000008c00)="61dbda53f423e6a17c9b4cd3cf3f2145d40b9cbe57c19c2b3a1cde60b2aecf2703990f5f578511630725b0f1e8657f66519a86caa0a3f2392c821170f05bcfc8b863271eb963", 0x46}, {&(0x7f0000008c80)="498b0fc67e7cc1736a62eefdfd7202de2f4199264ff9ddaaa40dbe959b56eb341a37c8d7ee532933e056fad47dca0b359aa66946aaf74318372a70d26231fb9e5d95319da182542322f297f78fac4381e5f9059c058801ae588edb318cd3b82f805d1feee2bef9e104e0c9afe332832ef730f1a3093cf49be8815661c1f5bff3f1ac542c94ebc3fa68b8a0691a1f5c89591bedf7aeac299b01a74cff7bf29ffb83a944b9d98a63937c40290589099d2b67f1", 0xb2}, {&(0x7f0000008d40)="bf49b002881ddc", 0x7}], 0x4, &(0x7f0000008ec0)=ANY=[@ANYBLOB="2000000000000000840000000200000002000c000800000005000000", @ANYRES32=r13, @ANYBLOB="180000000000000004000000087328de0000000000000000"], 0x38, 0x2040080}, {&(0x7f0000008f00)=@in6={0xa, 0x4e20, 0xd7a, @ipv4={[], [], @loopback}, 0x4e4e}, 0x1c, &(0x7f0000009140)=[{&(0x7f0000008f40)="6c77ed201f918812b17974d7c7e2d3f0c2db3539ebe3d3524257f7c0cda03abaacaa4c64c6d1e274f7debf0beb9a856d6d313c1609", 0x35}, {&(0x7f0000008f80)}, {&(0x7f0000008fc0)="1ff506bc06b1661969c8b2569e159b20e334c5f7ceabb53c6881ea6cf8c6acdcfa146e984a83c58546f0c5da21f883ed3f28dd1b5545113824e598c59cd2231b7b5bc9ea9cbea1933a10077b349d076e5511a2b2812cbd1a424e75536d42c094561812a541b4f33fec153917a1d8032471df9e4495cb04c1e7be72c021e416a5cc898fde7565ecaa1d5cd2762d7e679d275d4b75098c6c96de1c6a46987e0e0e8db58162d6971793029878f14b129f2773426b8ce54eafde66f6e9709b3632c9c5138a003320652242fa925a11a75734410ce82478cfa2590d12b791770e6eb7d45563b59c913708cd483f9da12d", 0xee}, {&(0x7f00000090c0)="41e80a1e4c46eabcfce2aac11ca0cbb9cc6c82d41d732b2c1ea335d1c733b7e917263dd4c93067b5c34b247c9b9574136eb3cb7ea6629744b22135622c5fe185f271cb2ae8074ad6e6bb7cea2b0887ae020029fc787dc867123aebc9a92a233be4f73d530b68759fe8a42586ebe1afb3209fb1f5f2eca5194c0eeb98e6", 0x7d}], 0x4, &(0x7f0000009180)=[@authinfo={0x18}, @prinfo={0x18, 0x84, 0x5, {0x0, 0xe796}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x9d1c, 0x0, 0x42e09d8c, 0x0, 0xf6, 0x400, 0x7050}}, @init={0x18, 0x84, 0x0, {0x7c1, 0xa6, 0x4, 0x3}}], 0x78, 0x2000800d}], 0x8, 0x4020084) close(r0) getsockopt$TIPC_DEST_DROPPABLE(r11, 0x10f, 0x81, &(0x7f0000009500), &(0x7f0000009540)=0x4) 15:55:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) [ 782.621753] ISOFS: Unable to identify CD-ROM format. 15:55:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03003f0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 15:55:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8dffffff, 0x0, 0x0) [ 782.843640] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 782.849931] ISOFS: Unable to identify CD-ROM format. [ 782.903494] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 782.925636] CPU: 1 PID: 29168 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 782.932572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.941947] Call Trace: [ 782.944572] dump_stack+0x172/0x1f0 [ 782.948215] warn_alloc.cold+0x7b/0x173 [ 782.952205] ? zone_watermark_ok_safe+0x260/0x260 [ 782.957036] ? lock_downgrade+0x810/0x810 [ 782.957063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.957077] ? avc_has_perm+0x404/0x610 [ 782.957102] __vmalloc_node_range+0x486/0x790 [ 782.975251] ? sel_write_load+0x1de/0x470 [ 782.979419] vmalloc+0x6b/0x90 [ 782.982628] ? sel_write_load+0x1de/0x470 [ 782.986793] sel_write_load+0x1de/0x470 [ 782.990774] __vfs_write+0x114/0x810 [ 782.994504] ? sel_make_policy_nodes+0x1520/0x1520 [ 782.999430] ? kernel_read+0x120/0x120 [ 783.003317] ? __lock_is_held+0xb6/0x140 [ 783.007392] ? rcu_read_lock_sched_held+0x110/0x130 [ 783.012412] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 783.017179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.022712] ? __sb_start_write+0x1a9/0x360 [ 783.027031] vfs_write+0x20c/0x560 [ 783.030580] ksys_write+0x14f/0x2d0 [ 783.034208] ? __ia32_sys_read+0xb0/0xb0 [ 783.038270] ? do_syscall_64+0x26/0x620 [ 783.042255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.047619] ? do_syscall_64+0x26/0x620 [ 783.051597] __x64_sys_write+0x73/0xb0 [ 783.055486] do_syscall_64+0xfd/0x620 [ 783.059287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.064479] RIP: 0033:0x459a29 [ 783.067671] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 783.086585] RSP: 002b:00007f5966df2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 783.094304] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 15:55:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:47 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff030e5a0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 783.101565] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 783.108829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 783.116094] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5966df36d4 [ 783.123351] R13: 00000000004c9cd0 R14: 00000000004e15e0 R15: 00000000ffffffff [ 783.169248] ISOFS: Unable to identify CD-ROM format. [ 783.182758] Mem-Info: [ 783.191167] active_anon:176963 inactive_anon:238 isolated_anon:0 [ 783.191167] active_file:13293 inactive_file:36543 isolated_file:0 [ 783.191167] unevictable:0 dirty:215 writeback:0 unstable:0 [ 783.191167] slab_reclaimable:15919 slab_unreclaimable:120056 [ 783.191167] mapped:59031 shmem:282 pagetables:1510 bounce:0 [ 783.191167] free:1164106 free_pcp:530 free_cma:0 15:55:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300600d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:47 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x20000768) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 783.245895] Node 0 active_anon:703640kB inactive_anon:852kB active_file:52928kB inactive_file:146172kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236124kB dirty:860kB writeback:0kB shmem:1028kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 180224kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 783.345958] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 783.346466] ISOFS: Unable to identify CD-ROM format. [ 783.377407] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 783.405034] lowmem_reserve[]: 0 2555 2557 2557 [ 783.433567] Node 0 DMA32 free:862716kB min:36248kB low:45308kB high:54368kB active_anon:703568kB inactive_anon:908kB active_file:52976kB inactive_file:146228kB unevictable:0kB writepending:948kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:8160kB pagetables:5904kB bounce:0kB free_pcp:2048kB local_pcp:1060kB free_cma:0kB [ 783.470141] lowmem_reserve[]: 0 0 2 2 [ 783.475571] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 15:55:47 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r2, &(0x7f00000000c0)={'syz0', "373e1a3e445aafadf54bc9740eb4eb62e65426c701d272f2b3837ff1ba872b099d6b8a7f1789bb75f13bcec2bcb8c3fb49137cf7c9faeeaff8f60283cc8aa8fff6cb35b173461e60795365e151"}, 0x51) close(r0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$IMGETCOUNT(r3, 0x80044943, &(0x7f0000000080)) 15:55:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xa0008000, 0x0, 0x0) 15:55:47 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xf00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 783.527746] lowmem_reserve[]: 0 0 0 0 [ 783.558154] Node 1 Normal free:3783240kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 783.624718] ISOFS: Unable to identify CD-ROM format. [ 783.660315] lowmem_reserve[]: 0 0 0 0 [ 783.669887] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 783.693742] Node 0 DMA32: 5823*4kB (UME) 796*8kB (UME) 390*16kB (UME) 273*32kB (UME) 674*64kB (UME) 271*128kB (UM) 98*256kB (UM) 39*512kB (UM) 13*1024kB (UM) 3*2048kB (UM) 166*4096kB (M) = 866908kB [ 783.729055] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 783.747955] Node 1 Normal: 64*4kB (UME) 217*8kB (UME) 268*16kB (UM) 74*32kB (UME) 12*64kB (UE) 13*128kB (UME) 9*256kB (UE) 3*512kB (UM) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783240kB [ 783.765403] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 783.775348] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 783.784557] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 783.793769] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 783.802806] 50099 total pagecache pages [ 783.807151] 0 pages in swap cache 15:55:48 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 15:55:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff030e720d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:48 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00', &(0x7f0000000140)=""/15, 0xf) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r2, &(0x7f0000000080), 0x40) 15:55:48 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xf0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fstat(r3, &(0x7f0000000280)) setns(r2, 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000000)=0x4) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000000c0)={0x4, 0x20e, 0x7, 0x0, r6}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180)={r7, 0x6}, &(0x7f00000001c0)=0x8) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x10000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) close(r0) 15:55:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xac050000, 0x0, 0x0) [ 783.810701] Swap cache stats: add 0, delete 0, find 0/0 [ 783.816375] Free swap = 0kB [ 783.819489] Total swap = 0kB [ 783.822590] 1965979 pages RAM [ 783.825761] 0 pages HighMem/MovableOnly [ 783.830085] 338856 pages reserved [ 783.833636] 0 pages cma reserved [ 783.933277] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 783.958626] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 783.975545] CPU: 1 PID: 29221 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 783.982485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.991833] Call Trace: [ 783.994430] dump_stack+0x172/0x1f0 [ 783.998063] warn_alloc.cold+0x7b/0x173 [ 784.002049] ? zone_watermark_ok_safe+0x260/0x260 [ 784.006907] ? lock_downgrade+0x810/0x810 [ 784.011069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.016608] ? avc_has_perm+0x404/0x610 [ 784.020584] __vmalloc_node_range+0x486/0x790 [ 784.025091] ? sel_write_load+0x1de/0x470 [ 784.029237] vmalloc+0x6b/0x90 [ 784.032431] ? sel_write_load+0x1de/0x470 [ 784.036580] sel_write_load+0x1de/0x470 [ 784.040556] __vfs_write+0x114/0x810 [ 784.044273] ? sel_make_policy_nodes+0x1520/0x1520 [ 784.049204] ? kernel_read+0x120/0x120 [ 784.053095] ? __lock_is_held+0xb6/0x140 [ 784.057170] ? rcu_read_lock_sched_held+0x110/0x130 [ 784.062186] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 784.067035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.072580] ? __sb_start_write+0x1a9/0x360 [ 784.076911] vfs_write+0x20c/0x560 [ 784.080453] ksys_write+0x14f/0x2d0 [ 784.084082] ? __ia32_sys_read+0xb0/0xb0 [ 784.088140] ? do_syscall_64+0x26/0x620 [ 784.092102] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.097452] ? do_syscall_64+0x26/0x620 [ 784.101420] __x64_sys_write+0x73/0xb0 [ 784.105295] do_syscall_64+0xfd/0x620 [ 784.109084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.114253] RIP: 0033:0x459a29 [ 784.117426] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.136319] RSP: 002b:00007f5966df2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 784.144008] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 784.151274] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 784.158526] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 784.165783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5966df36d4 [ 784.173037] R13: 00000000004c9cd0 R14: 00000000004e15e0 R15: 00000000ffffffff 15:55:48 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 784.192847] Mem-Info: [ 784.201401] active_anon:176956 inactive_anon:252 isolated_anon:0 [ 784.201401] active_file:13280 inactive_file:36557 isolated_file:0 [ 784.201401] unevictable:0 dirty:237 writeback:0 unstable:0 [ 784.201401] slab_reclaimable:15879 slab_unreclaimable:119886 [ 784.201401] mapped:59046 shmem:299 pagetables:1550 bounce:0 [ 784.201401] free:1164757 free_pcp:153 free_cma:0 [ 784.254176] ISOFS: Unable to identify CD-ROM format. 15:55:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03ffe00d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 784.325436] Node 0 active_anon:705740kB inactive_anon:908kB active_file:52876kB inactive_file:146228kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236084kB dirty:948kB writeback:0kB shmem:1096kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 182272kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 15:55:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xe8030000, 0x0, 0x0) [ 784.446681] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 15:55:48 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000080)={0x0, 0x81000}) [ 784.490776] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 784.526018] lowmem_reserve[]: 0 2555 2557 2557 [ 784.531751] Node 0 DMA32 free:859080kB min:36248kB low:45308kB high:54368kB active_anon:707836kB inactive_anon:952kB active_file:53032kB inactive_file:146252kB unevictable:0kB writepending:1000kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:8288kB pagetables:6016kB bounce:0kB free_pcp:2064kB local_pcp:1320kB free_cma:0kB [ 784.565666] ISOFS: Unable to identify CD-ROM format. [ 784.571075] lowmem_reserve[]: 0 0 2 2 [ 784.584064] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 784.626274] lowmem_reserve[]: 0 0 0 0 15:55:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 784.637634] Node 1 Normal free:3783240kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 784.713110] lowmem_reserve[]: 0 0 0 0 [ 784.723897] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 784.746113] Node 0 DMA32: 5655*4kB (UE) 930*8kB (UME) 211*16kB (UME) 293*32kB (UME) 680*64kB (UME) 285*128kB (UM) 98*256kB (UM) 39*512kB (UM) 13*1024kB (UM) 1*2048kB (U) 166*4096kB (M) = 863164kB [ 784.767350] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 784.800409] Node 1 Normal: 64*4kB (UME) 217*8kB (UME) 268*16kB (UM) 74*32kB (UME) 12*64kB (UE) 13*128kB (UME) 9*256kB (UE) 3*512kB (UM) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783240kB [ 784.843937] ISOFS: Unable to identify CD-ROM format. [ 784.863957] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 784.873535] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 784.882498] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 15:55:49 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 15:55:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xeffdffff, 0x0, 0x0) 15:55:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300f00d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:49 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x64100, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x3, 0x3, 0x92, 0x0, 0xf4f, 0x1, 0xff, 0x1, 0x60, 0x1, 0x0, 0x6, 0x0, 0x8000, 0x7, 0xff, 0xb7, 0x7, 0xb}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/fscreate\x00', 0x2, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:49 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x205, &(0x7f00000008c0)=ANY=[@ANYRESHEX=r2, @ANYBLOB="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", @ANYRES64=0x0, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r3, @ANYRES16=r4, @ANYRES16=r5, @ANYBLOB="f184ee6bb6517bbd33cb5384ae87848653dc11b697e1b8d612eed479e0fb34d57850987484", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYPTR, @ANYRES32=0x0, @ANYRES16=r6, @ANYRESOCT=r7], @ANYRESHEX], @ANYRES64=r8, @ANYRES16=r9], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r10, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:55:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 784.892012] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 784.901035] 50199 total pagecache pages [ 784.905090] 0 pages in swap cache [ 784.908960] Swap cache stats: add 0, delete 0, find 0/0 [ 784.914382] Free swap = 0kB [ 784.917796] Total swap = 0kB [ 784.923744] 1965979 pages RAM [ 784.928654] 0 pages HighMem/MovableOnly [ 784.932695] 338856 pages reserved [ 784.936485] 0 pages cma reserved 15:55:49 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)={0x3, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) [ 785.037441] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 785.095974] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 785.099462] ISOFS: Unable to identify CD-ROM format. [ 785.116502] CPU: 0 PID: 29269 Comm: syz-executor.5 Not tainted 4.19.75 #0 [ 785.123463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.132813] Call Trace: [ 785.135405] dump_stack+0x172/0x1f0 [ 785.139042] warn_alloc.cold+0x7b/0x173 [ 785.143019] ? zone_watermark_ok_safe+0x260/0x260 [ 785.147877] ? lock_downgrade+0x810/0x810 [ 785.152052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.157599] ? avc_has_perm+0x404/0x610 [ 785.161586] __vmalloc_node_range+0x486/0x790 [ 785.166143] ? sel_write_load+0x1de/0x470 [ 785.170298] vmalloc+0x6b/0x90 [ 785.173489] ? sel_write_load+0x1de/0x470 [ 785.177638] sel_write_load+0x1de/0x470 [ 785.181616] __vfs_write+0x114/0x810 [ 785.185331] ? sel_make_policy_nodes+0x1520/0x1520 [ 785.190359] ? kernel_read+0x120/0x120 [ 785.194281] ? __lock_is_held+0xb6/0x140 [ 785.198353] ? rcu_read_lock_sched_held+0x110/0x130 [ 785.203368] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 785.208121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.213661] ? __sb_start_write+0x1a9/0x360 [ 785.217990] vfs_write+0x20c/0x560 [ 785.221534] ksys_write+0x14f/0x2d0 [ 785.225162] ? __ia32_sys_read+0xb0/0xb0 [ 785.229226] ? do_syscall_64+0x26/0x620 [ 785.233204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.238563] ? do_syscall_64+0x26/0x620 [ 785.242543] __x64_sys_write+0x73/0xb0 [ 785.246429] do_syscall_64+0xfd/0x620 [ 785.250227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.255422] RIP: 0033:0x459a29 [ 785.258620] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.277513] RSP: 002b:00007f5966df2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 785.285227] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 15:55:49 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x800, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000300)) syz_mount_image$nfs(&(0x7f0000000080)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="0ab9c7de434767ced74c35c757ed2aea52dcbc80748098eacdaaeb1b5d3d04192bca5c65aee8a329714d0777ec42de465bbc3e9a367746762177ed94458e9e6f009754ff2c85f1e25f07677f3f9afde953ca9b987c9b392239f7fe1ce2be52a21e", 0x61, 0x3}], 0x82200, &(0x7f00000001c0)='\x00') socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000280)={'teql0\x00', {0x2, 0x4e24, @multicast2}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000014000000bfa300000000009c5f120ed196439e6ce2a5f68fad5360000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123da90c7ecebcfb48e1a241acde293ee7cb43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e000000000000000000000000000000000000f300000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e4d70d404da00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x17, r4, &(0x7f0000000040)='asymmetric\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r3, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ashmem\x00', 0x20040, 0x0) 15:55:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03e0ff0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:49 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000080)=""/96, 0x60, 0x2000, &(0x7f0000000100)=@x25={0x9, @null=' \x00'}, 0x80) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) [ 785.292490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 785.299752] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 785.307015] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5966df36d4 [ 785.314291] R13: 00000000004c9cd0 R14: 00000000004e15e0 R15: 00000000ffffffff [ 785.330032] Mem-Info: [ 785.332641] active_anon:175392 inactive_anon:263 isolated_anon:0 [ 785.332641] active_file:13294 inactive_file:36563 isolated_file:0 [ 785.332641] unevictable:0 dirty:250 writeback:0 unstable:0 [ 785.332641] slab_reclaimable:15713 slab_unreclaimable:119728 [ 785.332641] mapped:59036 shmem:307 pagetables:1467 bounce:0 [ 785.332641] free:1166191 free_pcp:667 free_cma:0 15:55:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 785.375190] Node 0 active_anon:701568kB inactive_anon:952kB active_file:53032kB inactive_file:146252kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236144kB dirty:1000kB writeback:0kB shmem:1128kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 184320kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 15:55:49 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) [ 785.479007] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 785.554712] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 785.596778] ISOFS: Unable to identify CD-ROM format. [ 785.605996] lowmem_reserve[]: 0 2555 2557 2557 [ 785.610933] Node 0 DMA32 free:870548kB min:36248kB low:45308kB high:54368kB active_anon:699372kB inactive_anon:952kB active_file:53036kB inactive_file:146288kB unevictable:0kB writepending:1052kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:8032kB pagetables:5816kB bounce:0kB free_pcp:2588kB local_pcp:1228kB free_cma:0kB [ 785.644401] lowmem_reserve[]: 0 0 2 2 [ 785.648590] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 785.674903] lowmem_reserve[]: 0 0 0 0 [ 785.682980] Node 1 Normal free:3783240kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 785.711236] lowmem_reserve[]: 0 0 0 0 [ 785.715145] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 785.730700] Node 0 DMA32: 5812*4kB (UME) 944*8kB (UME) 175*16kB (UME) 324*32kB (UME) 682*64kB (UME) 286*128kB (UM) 98*256kB (UM) 39*512kB (UM) 13*1024kB (UM) 4*2048kB (UM) 166*4096kB (M) = 870720kB [ 785.761999] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 785.780027] Node 1 Normal: 64*4kB (UME) 217*8kB (UME) 268*16kB (UM) 74*32kB (UME) 12*64kB (UE) 13*128kB (UME) 9*256kB (UE) 3*512kB (UM) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783240kB [ 785.797511] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 785.806712] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 785.815468] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 785.824671] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 785.833855] 50135 total pagecache pages [ 785.838119] 0 pages in swap cache [ 785.841639] Swap cache stats: add 0, delete 0, find 0/0 [ 785.847296] Free swap = 0kB [ 785.850358] Total swap = 0kB [ 785.853412] 1965979 pages RAM [ 785.857529] 0 pages HighMem/MovableOnly 15:55:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 15:55:50 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xf4010000, 0x0, 0x0) 15:55:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300020d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCAX25DELFWD(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f00000000c0)={0x4, 0x638, [{0xfffffe01, 0x0, 0x6}, {0x8, 0x0, 0x3}, {0x81, 0x0, 0x9}, {0x9, 0x0, 0x3}]}) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) close(r0) 15:55:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 785.861556] 338856 pages reserved [ 785.865056] 0 pages cma reserved 15:55:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 15:55:50 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000024c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a4, &(0x7f0000000780)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xffffff17) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r3, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCSMRU1(r4, 0x40047452, &(0x7f00000000c0)=0x5) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r5, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 785.945325] sel_write_load: 2 callbacks suppressed [ 785.945330] SELinux: failed to load policy [ 786.011396] ISOFS: Unable to identify CD-ROM format. 15:55:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_smack_transmute(r1, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000340)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300)={0x5, 0x16}, 0xc) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000180)=0x5) r4 = socket$kcm(0x29, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000000)) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @rose, @remote, @default]}, 0x48) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000001c0)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x181500) close(r0) 15:55:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300040d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 786.071860] SELinux: failed to load policy 15:55:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 15:55:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:50 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x2e8, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000000)={0x3}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:55:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xf5ffffff, 0x0, 0x0) 15:55:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5000008912, &(0x7f00000000c0)) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000080)=0xfffffc01) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)={[{0x2d, 'pids'}, {0x0, 'memory'}, {0x2d, 'rdma'}]}, 0x14) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000040)={r2, 0x1, 0x4, "442ad4"}) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x40000, 0x0) connect$bt_l2cap(r4, &(0x7f0000000280)={0x1f, 0x3f, {0x7f, 0x7, 0x8e, 0x0, 0x6}, 0x6, 0x5}, 0xe) setns(0xffffffffffffffff, 0x10000000) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x1f1400, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000180)=0xf000) ioctl$VT_ACTIVATE(r5, 0x5606, 0x7) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) 15:55:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6"}, 0x18) [ 786.234765] SELinux: failed to load policy 15:55:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03000a0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000b4"], 0x10}}, 0x0) dup3(r1, r2, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="020a0000020000000000000000000000a364a092c91bfb5be11ec90785e2ff042166b864c3cd989608b0b4198e7403792e9f2f3c0b951a8ca7476e7cb59727d1159024eca9663453f6c72952c4f0581c3b0f7e315b252c453f67ebc779465dccff05264772c4a2a2563167008904168c482871462c584d428ede4f93d0b7df6550b3404c07000000000000009140e56d909dcf058b3427d8eec97fb6"], 0x10}}, 0x0) r3 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f00000004c0)={0x1, @raw_data="f3f7fc89a82d63d32510fa2517e07113f426f74913bc7d8ccb7c4e956456dd8b9f07dff25e0db894ed674f85946881bacf830638e448638beebfe2fd7a49e4341c842aeded5cbdb776e945717affb013f3813ef82516e893a71ef5ef93341365d2696272f43c9574f3c296cad841ea850a057ca14c352e0e1a6d91eb00ee613a5e5bbe7fb9ce90830ef2534bf30565aa69f89d0a9cd56072ad92310f1cad6c8e01778d5d4b14fe73f78570df62b91b45137f61b23e2a1453392919a830c89470c73753ee4c5ee93a"}) r4 = geteuid() getgroups(0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r6, r4) fstat(0xffffffffffffffff, &(0x7f0000000300)) keyctl$setperm(0x5, 0x0, 0x0) keyctl$chown(0x4, 0x0, r4, r5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000001c0)={0xa30000, 0x1f, 0x9, [], &(0x7f00000000c0)={0x990a68, 0x6, [], @string=&(0x7f0000000080)=0x4}}) ioctl(r7, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6"}, 0x18) [ 786.338123] ISOFS: Unable to identify CD-ROM format. [ 786.350167] SELinux: failed to load policy 15:55:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfc000000, 0x0, 0x0) [ 786.463107] SELinux: failed to load policy 15:55:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03000e0d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6"}, 0x18) [ 786.547081] ISOFS: Unable to identify CD-ROM format. 15:55:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896"}, 0x1c) [ 786.633626] SELinux: failed to load policy 15:55:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$MON_IOCX_GET(r2, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000000), &(0x7f0000000080)=""/17, 0x11}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote, @default]}, 0x48) close(r0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000140)=0x968, 0x4) 15:55:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfe800000, 0x0, 0x0) 15:55:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896"}, 0x1c) 15:55:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300600d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 786.770648] SELinux: failed to load policy 15:55:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) setsockopt(0xffffffffffffffff, 0x2, 0x400, &(0x7f0000000080)="8f3ced3ed87119f6bae10e493372280a2e7d91921104cb9aff5e65a887a7441de7dec547f87588ee5d7f2a55c8a81a04afeb5db6053d0db1ff9d0b9264d85101a3b801f8b25073cbef24f421674281cad801f11f14b78b0eac85dc3ccc7931b5aedf56451c4195bd5e19d3809bbc0102a5f212c930bfb7841055234d3b52bcfd0e8daa9791710574fa76ead1ee27f1b50724329a262c376e079c649b25f6300d22425bf3e49a1acb99abbe2e0431a00cc6825c7b38fb8fc9fb0f850eb90826", 0xbf) close(r0) [ 786.827991] ISOFS: Unable to identify CD-ROM format. 15:55:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896"}, 0x1c) [ 786.850629] SELinux: failed to load policy 15:55:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df"}, 0x1e) 15:55:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xe6f3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x3f, &(0x7f0000000000)="11dc38ac4dd00016cbc6267aa50d5e0bcf8129a458") bind$ax25(r2, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r2) [ 786.959049] SELinux: failed to load policy 15:55:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfec00000, 0x0, 0x0) [ 787.068963] ISOFS: Unable to identify CD-ROM format. 15:55:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df"}, 0x1e) 15:55:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300e00d698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 787.105714] SELinux: failed to load policy 15:55:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:51 executing program 4: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r1, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) write$FUSE_BMAP(r3, &(0x7f0000000000)={0x18, 0xda60cf54c1275f5d, 0x6, {0x5}}, 0x18) close(r1) 15:55:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df"}, 0x1e) 15:55:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df50"}, 0x1f) 15:55:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff03000020698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 787.321612] ISOFS: Unable to identify CD-ROM format. 15:55:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @null, 0x1}, [@null, @default, @bcast, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) close(r0) 15:55:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfeffffff, 0x0, 0x0) 15:55:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df50"}, 0x1f) 15:55:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1300000065ffff3fa800000600395032303030db0bd185d1a5c0a19425766f8ef9d1c2c0fe474f2ee8d94cd207fd6dceaba45128ca72e892c40ee9008c7eff00000000000000607a95822fbde8e2b3086594c6f45f75fe922fc02a3d6869cba18131215ad8260fd455926305c5a4b94c19f403"], 0x13) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @null, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f00000001c0)=0xfffff001) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {r4, r5/1000+30000}}) 15:55:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df50"}, 0x1f) 15:55:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300ffe0698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 787.616275] ISOFS: Unable to identify CD-ROM format. 15:55:51 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @default, @rose, @remote, @default]}, 0x48) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000000)='syz0\x00') 15:55:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xff000000, 0x0, 0x0) 15:55:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote}, 0x0, @in=@multicast2}}, 0xe4) r1 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) sendmsg$key(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) dup3(r0, r1, 0x0) 15:55:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff030000e0698cb89e40f008001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000080)={0xf7cd, 0x0, 'client0\x00', 0x2, "cf984c310e6a4c8c", "58207ed8d04d881d918759bab650d920b3f16563836165c96072c44e8bc6f115", 0x1, 0x1}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000000)=0x8) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r1, &(0x7f0000000140)={{0x3, @bcast, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote, @default]}, 0x48) close(r1) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x1002, 0x0) getsockname$ax25(r0, &(0x7f00000002c0)={{0x3, @netrom}, [@bcast, @bcast, @remote, @remote, @bcast, @null]}, &(0x7f00000003c0)=0xbf) [ 787.898561] ISOFS: Unable to identify CD-ROM format. 15:55:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xff030000, 0x0, 0x0) 15:55:52 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x2c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:52 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="0bcbe0ea70221dbb37f271264ecb9b95"}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x4c066c43}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 788.200841] ISOFS: Unable to identify CD-ROM format. 15:55:52 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x4, 0x3, 0x3, 0x1, {0xa, 0x4e24, 0x3, @remote, 0x7}}}, 0x32) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xa05a1351d1b4127a, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r4, 0x118, 0x0, &(0x7f00000000c0)=0x5, 0x4) prctl$PR_SET_FP_MODE(0x2d, 0x0) close(r0) 15:55:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) 15:55:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xffff0000, 0x0, 0x0) 15:55:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f005001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:52 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x94) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='projid_map\x00') r2 = gettid() tkill(r2, 0x8000000000003b) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='C', 0x1}], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "6637f5c13ac6abb6f52fe896f7df505a"}, 0x20) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 788.459412] ISOFS: Unable to identify CD-ROM format. 15:55:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f0e0001fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffdef, 0x0, 0x0) 15:55:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 788.533484] SELinux: policydb version -1040894106 does not match my version range 15-31 15:55:52 executing program 5: [ 788.698480] ISOFS: Unable to identify CD-ROM format. 15:55:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0) 15:55:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000580), 0x12) 15:55:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:53 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000000)) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000180)={0x7, 0x9, 0xfff}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L+', 0x400}, 0x28, 0x2) connect$ax25(r4, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) 15:55:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xffffff8d, 0x0, 0x0) 15:55:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f043051fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:53 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r0) [ 789.011063] ISOFS: Unable to identify CD-ROM format. 15:55:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f0e0ff1fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:53 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)=0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) [ 789.339770] ISOFS: Unable to identify CD-ROM format. 15:55:53 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x4, 0xa3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$alg(0x26, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) close(r0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x42802) keyctl$join(0x1, 0x0) 15:55:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffff5, 0x0, 0x0) 15:55:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008021fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") unshare(0x8000400) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000001ac0)) 15:55:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:53 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose, @remote, @default]}, 0x48) close(r0) 15:55:53 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000000)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}], 0x1}}], 0x1, 0x0, 0x0) 15:55:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008041fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0) [ 789.689288] ISOFS: Unable to identify CD-ROM format. 15:55:53 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000080)={{0x3000, 0xf000, 0x4, 0x0, 0x4, 0x3, 0x0, 0x8, 0x14, 0x7, 0xd5, 0x7}, {0x5000, 0x4000, 0x4, 0x1b, 0x1, 0x3f, 0x9, 0x3f, 0x2, 0x5, 0xfd, 0x6}, {0x0, 0x5000, 0xa, 0xb6, 0x0, 0x80, 0x5, 0xfe, 0x5, 0x2, 0x8, 0x81}, {0x1000, 0x1000, 0x0, 0x0, 0x1, 0x8, 0x3, 0x54, 0x8, 0x1, 0xdc, 0x9}, {0x0, 0x0, 0xb, 0x3f, 0x22, 0x80, 0x1, 0x1, 0x5, 0xff, 0xff, 0x40}, {0x6000, 0x3000, 0x4261f179375fc52f, 0x3f, 0x1f, 0x6, 0x6f, 0xfd, 0x3f, 0x0, 0x7, 0x9}, {0x4, 0x10000, 0x4, 0x7f, 0x59, 0x6, 0x0, 0x4e, 0x80, 0x1, 0x3}, {0x200000, 0x2000, 0xc, 0x3, 0xff, 0x5, 0x7, 0x6, 0x8, 0x2, 0x6, 0x5}, {0x0, 0x8804}, {0x100000, 0x1000}, 0x40000, 0x0, 0x2000, 0x200000, 0x8, 0x2000, 0x10000, [0x7fffffff, 0x3, 0xd3c, 0x3]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000300)={"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"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000280)={0x4, 0x6900594e74cf31ec, {0x169029889dfc0858, 0xb4381ba31cff4019, 0x9, 0x2, 0x2}}) syz_open_procfs(0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020dfff9100000000000000000000000080012000000010b000000000500000004000000000000000000000014a6c020ecb95798000000000000000000000000000100000000000000001ffff100000003000600080008000200106cac14ffbbf000be0003000000030005000000000002004a3b5d632b91c520000000000098"], 0x80}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmmsg(r5, &(0x7f0000000180), 0x2e565d7c36d98a1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) 15:55:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x11}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 15:55:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:54 executing program 5: 15:55:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x10000000000, 0x0, 0x0) [ 789.988450] ISOFS: Unable to identify CD-ROM format. 15:55:54 executing program 5: 15:55:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xff0f000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f0080a1fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:54 executing program 5: 15:55:54 executing program 5: [ 790.245158] ISOFS: Unable to identify CD-ROM format. 15:55:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x7ffffffff000, 0x0, 0x0) 15:55:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xffff1f0000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:54 executing program 5: 15:55:54 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xcd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000000)=0x7, 0x4) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x4}, [@null, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @remote, @default]}, 0x17f) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x10500, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000280)={0x46, 0x0, [0x2, 0x3, 0x7fffffff, 0x2]}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="03000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000080)={r6, 0x9, 0x8001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000003c0)={r7, 0x800}, 0x8) close(r0) r8 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r8, 0xc038563b, &(0x7f0000000340)={0x0, 0x0, {0x1f, 0x80000001, 0x1ff, 0x7}}) 15:55:54 executing program 5: 15:55:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f0080e1fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 790.563994] ISOFS: Unable to identify CD-ROM format. 15:55:54 executing program 5: 15:55:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0) 15:55:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008601fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:54 executing program 5: 15:55:55 executing program 5: [ 790.822137] ISOFS: Unable to identify CD-ROM format. 15:55:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:55 executing program 5: 15:55:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008e01fffffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 791.071570] ISOFS: Unable to identify CD-ROM format. 15:55:55 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @null, 0x1}, [@null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose, @remote, @default]}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) close(r0) 15:55:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000a0ffffffff, 0x0, 0x0) 15:55:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fe0ffff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:55 executing program 5: 15:55:55 executing program 5: [ 791.476315] ISOFS: Unable to identify CD-ROM format. 15:55:55 executing program 4: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:55 executing program 5: 15:55:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffe0ff00004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:55 executing program 5: 15:55:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xf0ffffff7f0000, 0x0, 0x0) 15:55:55 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0xce) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x103000, 0x0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f00000000c0)={0x1, 0xd0, 0x9, 0x341, 0x5}) close(r0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000000)=0x5) 15:55:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:55 executing program 5: 15:55:56 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 15:55:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:56 executing program 5: 15:55:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffe000004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0) 15:55:56 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @remote, @default]}, 0x48) close(r0) fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:auth_cache_t:s0\x00', 0x22, 0x4) pkey_alloc(0x0, 0x3) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x2f, 0x2, 0x0, 0xf8, 0x0, 0x690, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1ff, 0x9, @perf_config_ext={0x9, 0x80000001}, 0x26802, 0x1, 0x7, 0x1, 0x6e, 0x8fe, 0xfffd}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r2, 0x40049409, r3) 15:55:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:56 executing program 5: 15:55:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:56 executing program 5: 15:55:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff02004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:56 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r3, 0x300, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x80, 0xffffff01, 0xfff, 0xca84}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:56 executing program 5: 15:55:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x103000000000000, 0x0, 0x0) 15:55:56 executing program 5: 15:55:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff04004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:56 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000280)="ed7cd2c4f1bf0b25a36c554653545c94efdda5a51fe33615d97a5d14abe502604b3304cd7383818e09fc12df57964c55be7893aac5697bd87f46c5b673fb6d434ab806c252d934f34a8e884421f620f1aa56eb2fe72a6be4e0df0eb86cd7eddd8555f6d6c8c0791a0fced830e22dab8b72f8bf2fa7b2aa2c3009273e9db22cbd28115be7d0", 0x85) r1 = socket(0x1, 0x3, 0xff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x295}, {0xa, 0x4e20, 0x8, @local, 0x8}, 0x1, [0x200, 0x3, 0x8001, 0x2, 0x1000, 0x401, 0x1, 0x1]}, 0x5c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x13}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000400)={r2, 0x40}, &(0x7f0000000440)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x1) r5 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f00000004c0)={r6, 0x401, 0x8001, "4fc41c0a6303d290084414566ef0b50768c191cb44f3eec57a"}) ioctl$DRM_IOCTL_GET_MAGIC(r4, 0x80046402, &(0x7f0000000340)=0x9) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) write$P9_RMKNOD(r7, &(0x7f0000000100)={0x14, 0x13, 0x2, {0x84, 0x4, 0x5}}, 0x14) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r8, 0x0) ioctl(0xffffffffffffffff, 0xfffffffffffffff7, &(0x7f0000000500)="7597bbde02aaa6593b461633fb80f354f87edcd1c04ebdc11f7b2d5c1a908a8a03ad9695f0d30f077f7f7320194e56286a6b52549af9134d49e84fd59fe8d5876e37812482f4de56432d5ea317731e86117d30ec34b47410a0a09dd1fb02fa17cdb4c7363ab0f63bbdafc99a1680aadde5f7448349badabd53dfad08caab909a0cee329f7be9ae098f98cad29870da6fd74070894bb08c212da8f7ec3a6984e643dd0c88c025cd014669b1da347cdf20bf267f930f12706ad24f858cc26bd7b7dcd2b48317d695087230025d974c9991337cf0e0426de6f81c9298df59f6eb9942bb7502172f7d0ef7c8d5297f1bbc2480") ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r8, 0xc0605345, &(0x7f0000000140)={0x9, 0x1, {0x4, 0x3, 0x8, 0x2, 0x1}}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:56 executing program 5: 15:55:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0) 15:55:56 executing program 5: 15:55:56 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.c\xcd\xb3\xef<\xcf\xcb\x97uF#:urrent\x00', 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x80000) close(r0) 15:55:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:56 executing program 5: 15:55:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff0a004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:57 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:57 executing program 5: 15:55:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0) 15:55:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:57 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0xfff, &(0x7f0000000040)="11dca50d5e0baab51daa70") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @null, @remote, @default]}, 0x48) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4138ae84, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000300)) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000240)=r5) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r6, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000280)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$bt_BT_CHANNEL_POLICY(r8, 0x112, 0xa, &(0x7f00000002c0)=0x100, 0x4) setns(r7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r5, r7, 0x0, 0x3, &(0x7f00000000c0)='./\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r10 = syz_open_procfs(r9, &(0x7f0000000100)='\x915v4\x00\x00\x00') setns(r10, 0x0) ioctl$KDGKBENT(r10, 0x4b46, &(0x7f0000000000)={0x6, 0x7f, 0x7}) close(r0) socket$nl_route(0x10, 0x3, 0x0) 15:55:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff0e004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:57 executing program 5: 15:55:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:57 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'veth0_to_bridge\x00', {0x2, 0x4e24, @loopback}}) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000540)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) init_module(&(0x7f0000000000)='\x00', 0x1, &(0x7f0000000080)='em1\x00') r2 = open(&(0x7f0000000580)='./file0\x00', 0x800, 0x2) ioctl$VFIO_IOMMU_MAP_DMA(r2, 0x3b71, &(0x7f00000005c0)={0x20, 0x2, 0x0, 0x8, 0x4}) r3 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpeername(r4, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x80) sendmsg$nl_route(r3, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3400}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=@ipmr_newroute={0xec, 0x18, 0x200, 0x70bd25, 0x25dfdbfc, {0x80, 0x14, 0x10, 0xda, 0xfd, 0x3, 0xc8, 0x0, 0x2000}, [@RTA_DST={0x6, 0x1, @multicast2}, @RTA_OIF={0x8, 0x4, r5}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x2}, @RTA_GATEWAY={0x8, 0x5, @rand_addr=0x401}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x2}, @RTA_PRIORITY={0x8, 0x6, 0x68}, @RTA_ENCAP={0xa0, 0x16, @generic="83ffc9bda857df82a03fb27da1cdce57fecfd55c94a908b6d03f1a493663e56f4620287c82cf5eca900b663c4d743b3b9d36008946663baadf1d5a76c666d1275e6a1d55faa9b52a228e79e69b8ad2cf8a0c4f306eabb8d9d6cedd8e5739f1704429a1cba85dc5283b5fcd8e041adc536dd67f96a6b16b12df4a3c6eeda826b3dcf9d79bb127ba6b7a2b08e138f981fe0997d0c278687963bb1c29"}]}, 0xec}, 0x1, 0x0, 0x0, 0x20004800}, 0x84891) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x12000, 0x0) ioctl$SIOCX25GSUBSCRIP(r6, 0x89e0, &(0x7f0000000440)={'veth0_to_team\x00', 0x1f, 0x400}) 15:55:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:57 executing program 5: 15:55:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0) 15:55:57 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote, @default]}, 0x48) close(r0) 15:55:57 executing program 5: 15:55:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff60004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:57 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @default, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:57 executing program 5: 15:55:57 executing program 5: 15:55:57 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = socket$can_raw(0x1d, 0x3, 0x1) fremovexattr(r2, &(0x7f0000000000)=@random={'osx.', 'trusted.em0\x00'}) close(r0) 15:55:57 executing program 5: 15:55:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0) 15:55:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffffe0004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:57 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getregset(0x4204, r3, 0x4, &(0x7f00000000c0)={&(0x7f0000000080)=""/41, 0x29}) 15:55:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000021000500d25a80648c63940d0324fc00100002400200a06d053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) 15:55:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:57 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x101080, 0x0) getsockname$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000ffdfdfed0ab33f1dd00892ea18b5184c1405f682d4a87ace79be867506829366065a08661b695e3da8a8406d9d4206ae0ac810c0df5be3885c3d2f5f8b0b0e9b2d8a00e0834515049ef9d934e31f8c82bc003b2a31"], &(0x7f0000000100)=0xa) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8546645ecdd41666, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000280)=0x8001, &(0x7f00000002c0)=0x2) 15:55:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x13, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 793.786204] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 15:55:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0) 15:55:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x47a4d21bd9b76874, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000080)=""/141, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000240)) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000015c0), &(0x7f0000001600)=0x4) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001700)='/dev/vga_arbiter\x00', 0x406000, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000800)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', @ANYBLOB, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00?\x00'/28, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00"/28, @ANYRES32=r0, @ANYBLOB="0000000000800000005391754c9b73c60b4240e5319cbd0f4700000000000000000000000000000600000000", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00 \x00'/28, @ANYRES32, @ANYBLOB="00000000030000000000000090ef5c801c1f5fd4293dee71b93162515096f648a3de5a2bb90641e3abb5aaf7053d4c9f2305b1c66f70c13d6a787475825122a6a994a015b732b5b9dc25fff4cee7d5dc95f41305d1043e85fa3144bdfc3fb390e39cac4f3bf64f43bf3927d135b745097a00df793d06451147a7131a3c64ca5f64bf42466d04c82a095b4d88df1330bf91aef5cc0dbdacb0aa03d1b60423814494664985e2991727537bb6a284af372428507175a672b68634c91efbb1a9410311982b89b895789862ad80d3bb055f74904e3e97362ddda97be9a4145674ef451c4fd546b1f9bda3dc", @ANYRES32=r1, @ANYBLOB="00000000976f00"/28]) sendto$inet6(r4, &(0x7f0000000540)="182b344c6bc114208cc06d0a4da76624bb4bbdda52b723caf5cdc8f363e4", 0x1e, 0x48050, &(0x7f0000000580)={0xa, 0x4e23, 0x8, @local, 0xffffffff}, 0x1c) sendto$packet(r4, &(0x7f0000000340), 0xc88f8882, 0x57, 0x0, 0x80) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r6, 0x10, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001400)={'lo\x00'}) 15:55:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001ffffffff0004000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x14, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:58 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4138ae84, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000240)=r4) fcntl$setown(0xffffffffffffffff, 0x8, r4) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f0000000280)={0x2, {{0x2, 0x4e23, @remote}}}, 0x88) [ 794.011540] device lo entered promiscuous mode 15:55:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x15, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0) 15:55:58 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) umount2(&(0x7f0000000000)='./file0\x00', 0xa) [ 794.191739] device lo left promiscuous mode 15:55:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0) 15:55:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x900000000000000, 0x0, 0x0) 15:55:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0) 15:55:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0) 15:55:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xe00000000000000, 0x0, 0x0) [ 794.865072] device lo entered promiscuous mode 15:55:59 executing program 5: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000000c0), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}}, 0x1c) 15:55:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0) 15:55:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000a4000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000280)=0x54) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xa7, 0x1, 0x8, "dabb7318b0b1791aa236f5a75f247b30", "11ee2a477118bfd21a3f6ddc4e28b79d000075d86dbcc1277009e0a248efaed918ac43cc45ca96f85073234710ec92bec8de2e8123143a0505e3566b95c2e0cc5bb2beb1eac458e3754430dc72b79d6cdfd98c68497fbcdc14a067ee5f060b31b47c46a3bdaee6d06620132b7b7cc4ecbd8b35aa3b87f1ae8dcbd14d134159ef6a6d9ded40cad6f076959ea4d6485ec0abc3"}, 0xa7, 0x1) 15:55:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x16, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:59 executing program 5: creat(0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x365) r0 = gettid() getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) tkill(r0, 0x13) 15:55:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FICLONE(r2, 0x40049409, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = socket(0x3, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x4, 0xa, 0x18, 0x0, "48d0a0268489ffa18ef45db287955fdb9f5995ffee2e64d93a44c94e497c12a43cdb0dfc7ea61a1bd03d556f2c0fb90e36e338d18fa1713d113e4580dc4808af", "e2f6b5ae2d84b12748f67fe0ba31aa0f31405b0e3e1b85f2be15c40c63d49989", [0x9, 0x5]}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockname$ax25(r4, &(0x7f0000000080)={{0x3, @netrom}, [@bcast, @rose, @remote, @default, @netrom, @bcast, @remote, @netrom]}, &(0x7f0000000000)=0x48) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x17, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000e4000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:55:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x1100000000000000, 0x0, 0x0) 15:55:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x2, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 15:55:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x18, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x0, 0x2b, 0x5b, &(0x7f0000000140)="5be52957d17907f2161d0ff7ec2b319d0d208186a27faef659ce242f4f2df15ae6928273054fedb6a038e4", &(0x7f0000000180)=""/91, 0xffff0001, 0x0, 0x1, 0xed, &(0x7f0000000280)='\f', &(0x7f00000002c0)="3e894239732ad45b470449d8a73ff706ef3fd9e99b3cc818be6a19ded32eca3d00c8bf956963846ceddaf5526f4fffb9f610c7f3ddb599f4ce95e2bc3bfc1fbc2de6549f418f0fc57782b86798567f2996458722c64c29baa529bf8164afdf05564bb816a8816564e4ff90d11a0578e2d33dd497ed02da84ac51fbe9e840913a90e50bdcedc0f0dd1a70fee4c8ff132a209c2a9528d1fedcb23793bcf52586ae7365d982b6bce7dcc27fd5495aeaaddf8f410306d07662a47e7ec9179e2b9f1d1899f1bf122779abc51a4e37dd2b19e71e66de712cadee27b4530066d6bf61e7613aad1e16e683fb38f4b29ed9"}, 0x40) setns(r1, 0x0) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000080)=ANY=[@ANYBLOB="050000003f00b07d0000ff0f00000000000000040000000000008100010000000000fdffffffffffffff0200000000000000fcffffffffffffff0400000000010000090000000000000001000100000000"]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose, @remote, @default]}, 0x48) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r4) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x100) 15:55:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x19, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:55:59 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:55:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r2 = msgget$private(0x0, 0x42) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) getsockopt$ax25_int(r3, 0x101, 0x0, &(0x7f00000001c0), &(0x7f0000000280)=0x4) r4 = epoll_create1(0x80000) fsetxattr$security_ima(r4, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000180)=@v1={0x2, "f0705e9a94c32c562b78cd60cb7086"}, 0x10, 0x3) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000080)=""/215) close(r0) 15:55:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff5a0e4000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x2100000000000000, 0x0, 0x0) 15:56:00 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @default, @remote, @default]}, 0x48) close(r0) 15:56:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x23, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:00 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff720e4000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:00 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r0) 15:56:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @default, @bcast, @null, @default, @rose, @remote, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0xff7a) close(0xffffffffffffffff) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000000)=0x4) 15:56:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x3000000000000000, 0x0, 0x0) 15:56:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00204000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:00 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r0) 15:56:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r1, 0x0) r2 = accept4$vsock_stream(r1, &(0x7f00000002c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0xc0c00) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, &(0x7f0000000340)) ioctl$sock_ifreq(r2, 0x891b, &(0x7f0000000300)={'vxcan1\x00', @ifru_flags=0x8202}) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @netrom, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0xa0003, 0x0) recvfrom$inet(r3, &(0x7f00000001c0)=""/153, 0x99, 0x40, &(0x7f0000000280)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) close(r0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x400000, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/enforce\x00', 0x10000, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000780)={&(0x7f0000000680)=""/218, 0x14000, 0x1800}, 0x18) write$P9_RREAD(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="39000000c8c8044620cabd748ed61a33bb091c423308100f2f0497326265feaa51140bbc2b8203a5da3d2bd02de688ba73d313fb92610c25d323f76da6f6ef4aeaef41c7ab91e4b585de5db161a01ad07326d8241455ad8d1cfbd0570d023a753ffd39111c6f4a112020083843e2633574a144ce9b6f8cd75d3adf5426ca2d3e6301159e506fd1f45b38cddfdceb6b9135a68fdfc67a9310a55d4adba0349fe4fb7eb8d8abc7f4b844aeede116ed710c9d3b4e3be0563e641e604437eec4b2b239cd1a90a78ccbf647018184d270d8f811c46502e57a1b98a3965ef7312281ae05a56e6b5230"], 0x39) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f0000000080)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000000800010006080700418e00000004fcff", 0x58}], 0x1) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r8, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="88000000", @ANYRES16=r9, @ANYBLOB="010026bd7000fbdbdf250c000000080004000100008008000600880000000100010000000800080001000000380001000800080009000000080004004e240000080008000300000008000800ff7f0000080001000a0000000c0007000000000004000000100001000c000700110000002000"/130], 0x88}, 0x1, 0x0, 0x0, 0x10000}, 0x8) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$FS_IOC_MEASURE_VERITY(r10, 0xc0046686, &(0x7f0000000940)={0x3, 0x5, "e35e85d762"}) sendmsg$IPVS_CMD_NEW_SERVICE(r7, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x64, r9, 0x201, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4024001}, 0x20000020) ioctl$ASHMEM_PURGE_ALL_CACHES(r4, 0x770a, 0x0) r11 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x10000) r12 = syz_genetlink_get_family_id$fou(&(0x7f0000000800)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x50, r12, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x28}}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}]}, 0x50}, 0x1, 0x0, 0x0, 0x4c081}, 0x800) ioctl$DRM_IOCTL_WAIT_VBLANK(r11, 0xc018643a, &(0x7f0000000080)={0x10000000, 0x3, 0x41d}) 15:56:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:00 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r0) 15:56:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0) 15:56:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 796.487878] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.4'. [ 796.556914] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=38 sclass=netlink_tcpdiag_socket pig=29965 comm=syz-executor.4 15:56:00 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@default, @default, @bcast, @null, @bcast, @rose, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000080)=0x4) 15:56:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff003f4000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:00 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) 15:56:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:01 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(0xffffffffffffffff) 15:56:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0) 15:56:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff0e5a4000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:01 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(0xffffffffffffffff) 15:56:01 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000280)={{0x81, 0x1}, {0x1, 0x3}, 0x3ff, 0x0, 0x5}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000080)={0x2, 0xbb, "f21f56bf56d4978ea52a60faf1019e99f0154d01d7544411986b300617b3b4a72ce7051efff8b7d18504f3b787f5e4523ca337c052c70d423206845f54c4e71c93e1f5f77e52ea7d1eb06704a63ef9f5f8de10f59bd4e02fec13779ae1ea7c25ec0869842e443c84a486a48ed2be7c5bee26accbc594b2f9113f5cba02d8fc016d0266e49b0c2a45c10a7ee70ed590e28c9552de32a780603f677008fcee143eede1d114b91da416fd91646b4a89332632476ce35a54060ffcdf28"}) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0xfffffffe}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RSETATTR(r2, &(0x7f0000000300)={0x7, 0x1b, 0x2}, 0x7) pread64(0xffffffffffffffff, 0x0, 0x360, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000785000), 0x34a) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000500}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) close(r0) 15:56:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:01 executing program 5: prctl$PR_SET_TSC(0x1a, 0x2) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(0xffffffffffffffff) 15:56:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x5800000000000000, 0x0, 0x0) 15:56:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00604000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:01 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 797.327306] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 797.423038] overlayfs: workdir and upperdir must reside under the same mount 15:56:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:01 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff0e724000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:01 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) close(r0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000000800010006080700418e00000004fcff", 0x58}], 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x110, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb6db}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xb58a}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3a06}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x916f960c7546e4e0}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdeaa}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7d5}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x44084}, 0x8000) 15:56:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf00, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x6000000000000000, 0x0, 0x0) 15:56:01 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:01 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8004020000000000, 0x0, 0x0) 15:56:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffffffe04000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 797.770868] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=38 sclass=netlink_tcpdiag_socket pig=30042 comm=syz-executor.4 [ 797.834412] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=38 sclass=netlink_tcpdiag_socket pig=30045 comm=syz-executor.4 15:56:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1300, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:02 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:02 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r2, 0x0) r3 = getpid() write$FUSE_LK(r2, &(0x7f0000001600)={0x28, 0x0, 0x3, {{0x4, 0x3ff, 0xee21441d106dcbe6, r3}}}, 0x28) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000001540)='/dev/swradio#\x00', 0x1, 0x2) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000001580)={r8, 0x5, 0x5, [0x944e, 0x6, 0x8001, 0x9, 0x1]}, &(0x7f00000015c0)=0x12) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffc4b}, 0x48) sendmsg$xdp(r4, &(0x7f0000001500)={&(0x7f0000000080)={0x2c, 0x0, r9, 0x14}, 0x10, &(0x7f0000001480)=[{&(0x7f00000000c0)="461f4dc6d12f9a0396ca593e492fe0445facf6fa50a9c2b2f6ea1173e2359c42af9de2bc176c116ead9d97c50559c8c2", 0x30}, {&(0x7f0000000100)="a9d88d1dde6d6385f9957dee7561340c4a85dbf252a5e3eea74678ef477bf9d5a796804dba497d98658c223c66c60e35", 0x30}, {&(0x7f0000000140)="a1462d317d18d8c4c5d12263b7879da30bf6a191f7ff8250b49a8549cf1c57f63b4a928a1d69b1faf95cc89e4652e5b6cde28e483c9978cc4b1d83061bfb9aa1022a", 0x42}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f00000001c0)="c75a34af501891076c6499b325b9b177a4e62dbcd765c8699b026978491d447d92", 0x21}, {&(0x7f0000001280)="7c77cc34bea6da6a202f4fee5f2714b2eb45a18a9adbc711417af66d8d4cd6b249ad9c2a43e736c3216215beba347e7497309e46599cab5e86fa06a7012ca2533e11944a373516dda0", 0x49}, {&(0x7f0000001300)="0093073ce7dc7b2ea585fb9b8af85c4ead3b7c6cf5f5baa9eca00dabbcc655cdc14378d96b91fccd053aafa9fd50dd3a0acb9b5174130c5db5475a3442250edf332fdd5e73e9397e9ea12a27805f5ad96581263454c95410fc040837b99000bd462a235d3d95648f57c42c968047cf40bb62b41937f35071c77c3c160c877294119849b2c3cf9df98bd002b8f3acc12ff9e1dc02be4cf884fde7d61a18ca86de78fd5de78a0c1097f2a6161c13d71eec95c8", 0xb2}, {&(0x7f00000013c0)="2d023cb29ea4ad71346679b3b3a58ddbd7ff4c67bbfcca522e94a6736ce60492a20298e986df5074426208e530331e47b03b1904b20925aff8c48ca863734acb232f9f07137edff5f84caa36d257cddcacaa078b92a7b5e89588a60242603b91b729b0463d026c1cc7384112d7146fca9638be5d783bfc4f9fa679d1dda0514396066ad9f2d63c2e9951cdab0ca870934d6f032cd58e6ba8f36f78dff6bba1611415", 0xa2}], 0x8, 0x0, 0x0, 0x5004}, 0x0) close(r0) 15:56:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1400, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00f04000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:02 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1500, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8405000000000000, 0x0, 0x0) 15:56:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1600, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:02 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1700, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffffe0ff4000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:02 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, 0x0, 0x0) close(r0) 15:56:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1800, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:03 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, 0x0, 0x0) close(r0) 15:56:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8dffffff00000000, 0x0, 0x0) 15:56:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00024000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1900, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:03 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, 0x0, 0x0) close(r0) 15:56:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x4}, [@null, @default, @bcast, @null, @bcast, @rose, @bcast, @default]}, 0x48) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r3, 0x0) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000280)={0x400, "6e5b9435be46abb5692464b80cf3dd6d81dee33f5832242697c78c0880af633e", 0x1010, 0x4, 0x0, 0x7d52115534230a5e, 0x3}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r5, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="81040000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r9, 0x400455c8, 0x100000001) ioctl$TIOCSETD(r9, 0x5412, &(0x7f0000000000)) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000140)={r8, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x635c}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000080)={r10, 0x0, 0x8}, 0x8) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r12, 0x0) quotactl(0x8, &(0x7f0000000300)='./file0\x00', r12, &(0x7f0000000340)="e9607a4b2446a29abc21a3e4af96a89d5c1882bff264789a239f42b93936ec1fab764fb7754953f94385baf11064d15bad33cc0fb3d0dc9accddcd2f727273d2b6b251e324") setns(r2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x7, 0x4) 15:56:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00044000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:03 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xac05000000000000, 0x0, 0x0) 15:56:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:03 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) 15:56:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff808ffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff000a4000633377fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 15:56:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c00, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) 15:56:03 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom}, [@null, @default, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) close(r0) [ 799.497037] Bluetooth: Error in BCSP hdr checksum 15:56:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xe803000000000000, 0x0, 0x0) 15:56:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000200)={[{@mode={'mode'}}]}) [ 799.761293] Bluetooth: Error in BCSP hdr checksum [ 801.307148] Bluetooth: hci0: command 0x1003 tx timeout [ 801.312930] Bluetooth: hci0: sending frame failed (-49) [ 803.393490] Bluetooth: hci0: command 0x1001 tx timeout [ 803.399941] Bluetooth: hci0: sending frame failed (-49) [ 805.465889] Bluetooth: hci0: command 0x1009 tx timeout [ 809.471622] ================================================================== [ 809.479157] BUG: KASAN: use-after-free in kfree_skb+0x38/0x390 [ 809.485122] Read of size 4 at addr ffff888054079c64 by task syz-executor.4/30103 [ 809.492637] [ 809.494263] CPU: 1 PID: 30103 Comm: syz-executor.4 Not tainted 4.19.75 #0 [ 809.501180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.510520] Call Trace: [ 809.513102] dump_stack+0x172/0x1f0 [ 809.516734] ? kfree_skb+0x38/0x390 [ 809.520372] print_address_description.cold+0x7c/0x20d [ 809.525644] ? kfree_skb+0x38/0x390 [ 809.529264] kasan_report.cold+0x8c/0x2ba [ 809.533414] check_memory_region+0x123/0x190 [ 809.537815] kasan_check_read+0x11/0x20 [ 809.541782] kfree_skb+0x38/0x390 [ 809.545234] bcsp_close+0xc7/0x130 [ 809.548771] hci_uart_tty_close+0x1ea/0x250 [ 809.553080] ? hci_uart_close+0x50/0x50 [ 809.557062] tty_ldisc_close.isra.0+0xaf/0xe0 [ 809.561551] tty_ldisc_kill+0x4b/0xc0 [ 809.565367] tty_ldisc_release+0xc6/0x280 [ 809.569511] tty_release_struct+0x1b/0x50 [ 809.573646] tty_release+0xbcb/0xe90 [ 809.577362] ? put_tty_driver+0x20/0x20 [ 809.581333] __fput+0x2dd/0x8b0 [ 809.584632] ____fput+0x16/0x20 [ 809.587911] task_work_run+0x145/0x1c0 [ 809.591825] exit_to_usermode_loop+0x273/0x2c0 [ 809.596407] do_syscall_64+0x53d/0x620 [ 809.600295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.605476] RIP: 0033:0x413711 [ 809.608664] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 809.627680] RSP: 002b:00007fff474e6dc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 809.635380] RAX: 0000000000000000 RBX: 000000000000000b RCX: 0000000000413711 [ 809.642657] RDX: 0000000000000000 RSI: 0000000000001877 RDI: 000000000000000a [ 809.649935] RBP: 0000000000000001 R08: 00000000f69bb87b R09: ffffffffffffffff [ 809.657211] R10: 00007fff474e6ea0 R11: 0000000000000293 R12: 000000000075c9a0 [ 809.664475] R13: 000000000075c9a0 R14: 0000000000761ff0 R15: 000000000075bfd4 [ 809.671751] [ 809.673366] Allocated by task 23: [ 809.676812] save_stack+0x45/0xd0 [ 809.680254] kasan_kmalloc+0xce/0xf0 [ 809.683965] kasan_slab_alloc+0xf/0x20 [ 809.687853] kmem_cache_alloc_node+0x144/0x710 [ 809.692427] __alloc_skb+0xd5/0x5f0 [ 809.696050] bcsp_recv+0x8c7/0x13a0 [ 809.699689] hci_uart_tty_receive+0x225/0x530 [ 809.704180] tty_ldisc_receive_buf+0x15f/0x1c0 [ 809.708757] tty_port_default_receive_buf+0x7d/0xb0 [ 809.713766] flush_to_ldisc+0x222/0x390 [ 809.717734] process_one_work+0x989/0x1750 [ 809.721960] worker_thread+0x98/0xe40 [ 809.725752] kthread+0x354/0x420 [ 809.729118] ret_from_fork+0x24/0x30 [ 809.732815] [ 809.734428] Freed by task 23: [ 809.737524] save_stack+0x45/0xd0 [ 809.740982] __kasan_slab_free+0x102/0x150 [ 809.745211] kasan_slab_free+0xe/0x10 [ 809.749004] kmem_cache_free+0x86/0x260 [ 809.752966] kfree_skbmem+0xcb/0x150 [ 809.756675] kfree_skb+0xf0/0x390 [ 809.760116] bcsp_recv+0x2d8/0x13a0 [ 809.763751] hci_uart_tty_receive+0x225/0x530 [ 809.768235] tty_ldisc_receive_buf+0x15f/0x1c0 [ 809.772811] tty_port_default_receive_buf+0x7d/0xb0 [ 809.777820] flush_to_ldisc+0x222/0x390 [ 809.781787] process_one_work+0x989/0x1750 [ 809.786013] worker_thread+0x98/0xe40 [ 809.789802] kthread+0x354/0x420 [ 809.793159] ret_from_fork+0x24/0x30 [ 809.796856] [ 809.798478] The buggy address belongs to the object at ffff888054079b80 [ 809.798478] which belongs to the cache skbuff_head_cache of size 232 [ 809.811741] The buggy address is located 228 bytes inside of [ 809.811741] 232-byte region [ffff888054079b80, ffff888054079c68) [ 809.823604] The buggy address belongs to the page: [ 809.828528] page:ffffea0001501e40 count:1 mapcount:0 mapping:ffff8880aa347ac0 index:0xffff888054079540 [ 809.837963] flags: 0x1fffc0000000100(slab) [ 809.842190] raw: 01fffc0000000100 ffffea0002453048 ffffea00025ad088 ffff8880aa347ac0 [ 809.850064] raw: ffff888054079540 ffff888054079040 0000000100000006 0000000000000000 [ 809.857930] page dumped because: kasan: bad access detected [ 809.863624] [ 809.865240] Memory state around the buggy address: [ 809.870166] ffff888054079b00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 809.877515] ffff888054079b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 809.884865] >ffff888054079c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 809.892214] ^ [ 809.898695] ffff888054079c80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 809.906050] ffff888054079d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 809.913397] ================================================================== [ 809.920755] Disabling lock debugging due to kernel taint [ 809.939289] Kernel panic - not syncing: panic_on_warn set ... [ 809.939289] [ 809.946757] CPU: 1 PID: 30103 Comm: syz-executor.4 Tainted: G B 4.19.75 #0 [ 809.955143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.964482] Call Trace: [ 809.967075] dump_stack+0x172/0x1f0 [ 809.970715] ? kfree_skb+0x38/0x390 [ 809.974333] panic+0x263/0x507 [ 809.977514] ? __warn_printk+0xf3/0xf3 [ 809.981393] ? kfree_skb+0x38/0x390 [ 809.985016] ? preempt_schedule+0x4b/0x60 [ 809.989156] ? ___preempt_schedule+0x16/0x18 [ 809.993556] ? trace_hardirqs_on+0x5e/0x220 [ 809.997889] ? kfree_skb+0x38/0x390 [ 810.001510] kasan_end_report+0x47/0x4f [ 810.005479] kasan_report.cold+0xa9/0x2ba [ 810.009629] check_memory_region+0x123/0x190 [ 810.014029] kasan_check_read+0x11/0x20 [ 810.017994] kfree_skb+0x38/0x390 [ 810.021441] bcsp_close+0xc7/0x130 [ 810.024977] hci_uart_tty_close+0x1ea/0x250 [ 810.029307] ? hci_uart_close+0x50/0x50 [ 810.033284] tty_ldisc_close.isra.0+0xaf/0xe0 [ 810.037774] tty_ldisc_kill+0x4b/0xc0 [ 810.041567] tty_ldisc_release+0xc6/0x280 [ 810.045707] tty_release_struct+0x1b/0x50 [ 810.049844] tty_release+0xbcb/0xe90 [ 810.053549] ? put_tty_driver+0x20/0x20 [ 810.057512] __fput+0x2dd/0x8b0 [ 810.060798] ____fput+0x16/0x20 [ 810.064073] task_work_run+0x145/0x1c0 [ 810.067961] exit_to_usermode_loop+0x273/0x2c0 [ 810.072558] do_syscall_64+0x53d/0x620 [ 810.076465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.081648] RIP: 0033:0x413711 [ 810.084836] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 810.103724] RSP: 002b:00007fff474e6dc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 810.111429] RAX: 0000000000000000 RBX: 000000000000000b RCX: 0000000000413711 [ 810.118692] RDX: 0000000000000000 RSI: 0000000000001877 RDI: 000000000000000a [ 810.125956] RBP: 0000000000000001 R08: 00000000f69bb87b R09: ffffffffffffffff [ 810.133216] R10: 00007fff474e6ea0 R11: 0000000000000293 R12: 000000000075c9a0 [ 810.140473] R13: 000000000075c9a0 R14: 0000000000761ff0 R15: 000000000075bfd4 [ 810.149041] Kernel Offset: disabled [ 810.152663] Rebooting in 86400 seconds..