00090000206d040ec304000000000109022400010000a0000904000001"], 0x0) syz_usb_control_io(r1, &(0x7f0000001580)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x0, 0x0, 0x0, "c09893e1", "00eac917"}}, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000700)={0x2c, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0}) 00:36:58 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:36:58 executing program 4: 00:36:58 executing program 1: 00:36:58 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:36:58 executing program 2: 00:36:58 executing program 4: 00:36:58 executing program 1: 00:36:58 executing program 2: [ 1031.907965][ T34] audit: type=1804 audit(1605832618.859:5097): pid=32516 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1224/bus" dev="sda1" ino=16228 res=1 errno=0 00:36:58 executing program 1: 00:36:59 executing program 4: [ 1032.093003][ T3194] usb 1-1: new high-speed USB device number 22 using dummy_hcd 00:36:59 executing program 2: [ 1032.359827][ T3194] usb 1-1: Using ep0 maxpacket: 16 [ 1032.487043][ T3194] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1032.542128][ T3194] usb 1-1: New USB device found, idVendor=046d, idProduct=c218, bcdDevice= 0.00 [ 1032.611722][ T3194] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1032.663934][ T3194] usb 1-1: config 0 descriptor?? [ 1032.712581][ T3194] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1032.914156][ T3194] usb 1-1: USB disconnect, device number 22 [ 1033.489649][ T3194] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 1033.729640][ T3194] usb 1-1: Using ep0 maxpacket: 32 [ 1033.849877][ T3194] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1033.860962][ T3194] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1033.875067][ T3194] usb 1-1: New USB device found, idVendor=046d, idProduct=c30e, bcdDevice= 0.04 [ 1033.884290][ T3194] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1033.905600][ T3194] usb 1-1: config 0 descriptor?? [ 1033.951050][ T3194] hub 1-1:0.0: USB hub found [ 1034.170098][ T3194] hub 1-1:0.0: 1 port detected [ 1034.389829][ T3194] hub 1-1:0.0: hub_hub_status failed (err = -71) [ 1034.397211][ T3194] hub 1-1:0.0: config failed, can't get hub status (err -71) [ 1034.407746][ T3194] usbhid 1-1:0.0: can't add hid device: -22 [ 1034.415017][ T3194] usbhid: probe of 1-1:0.0 failed with error -22 [ 1034.451047][ T3194] usb 1-1: USB disconnect, device number 23 00:37:01 executing program 4: 00:37:01 executing program 1: 00:37:01 executing program 2: 00:37:01 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:37:01 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) getpgid(0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:37:01 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc218, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000090000206d040ec304000000000109022400010000a0000904000001"], 0x0) syz_usb_control_io(r1, &(0x7f0000001580)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x0, 0x0, 0x0, "c09893e1", "00eac917"}}, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:37:01 executing program 4: 00:37:02 executing program 2: 00:37:02 executing program 1: [ 1035.096624][ T34] audit: type=1804 audit(1605832622.049:5098): pid=32574 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1225/bus" dev="sda1" ino=15960 res=1 errno=0 00:37:02 executing program 4: 00:37:02 executing program 2: 00:37:02 executing program 1: [ 1035.349854][T31013] usb 1-1: new high-speed USB device number 24 using dummy_hcd 00:37:02 executing program 4: 00:37:02 executing program 2: 00:37:02 executing program 1: [ 1035.589725][T31013] usb 1-1: Using ep0 maxpacket: 16 00:37:02 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) [ 1035.710450][T31013] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1035.747425][T31013] usb 1-1: New USB device found, idVendor=046d, idProduct=c218, bcdDevice= 0.00 [ 1035.807162][T31013] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1035.874440][T31013] usb 1-1: config 0 descriptor?? 00:37:02 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) getpgid(0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 1035.942679][T31013] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1036.132569][ T34] audit: type=1804 audit(1605832623.089:5099): pid=32601 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1226/bus" dev="sda1" ino=16168 res=1 errno=0 [ 1036.167928][T31013] usb 1-1: USB disconnect, device number 24 [ 1036.749889][T31013] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 1037.019712][T31013] usb 1-1: Using ep0 maxpacket: 32 [ 1037.139743][T31013] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1037.150753][T31013] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1037.162683][T31013] usb 1-1: New USB device found, idVendor=046d, idProduct=c30e, bcdDevice= 0.04 [ 1037.172171][T31013] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1037.185408][T31013] usb 1-1: config 0 descriptor?? [ 1037.241022][T31013] hub 1-1:0.0: USB hub found [ 1037.459733][T31013] hub 1-1:0.0: 1 port detected [ 1037.719917][T31013] hub 1-1:0.0: hub_hub_status failed (err = -71) [ 1037.727826][T31013] hub 1-1:0.0: config failed, can't get hub status (err -71) [ 1037.751761][T31013] usbhid 1-1:0.0: can't add hid device: -22 [ 1037.757789][T31013] usbhid: probe of 1-1:0.0 failed with error -22 [ 1037.790364][T31013] usb 1-1: USB disconnect, device number 25 00:37:05 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc218, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000090000206d040ec304000000000109022400010000a0000904000001"], 0x0) syz_usb_control_io(r1, &(0x7f0000001580)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x0, 0x0, 0x0, "c09893e1", "00eac917"}}, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:37:05 executing program 2: 00:37:05 executing program 4: 00:37:05 executing program 1: 00:37:05 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) 00:37:05 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) getpgid(0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:37:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:37:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x38) 00:37:05 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x5402, 0x0) [ 1038.418095][ T34] audit: type=1804 audit(1605832625.369:5100): pid=32635 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1227/bus" dev="sda1" ino=16384 res=1 errno=0 00:37:05 executing program 4: 00:37:05 executing program 1: 00:37:05 executing program 2: [ 1038.659825][ T7] usb 1-1: new high-speed USB device number 26 using dummy_hcd [ 1038.930240][ T7] usb 1-1: Using ep0 maxpacket: 16 [ 1039.070504][ T7] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1039.105736][ T7] usb 1-1: New USB device found, idVendor=046d, idProduct=c218, bcdDevice= 0.00 [ 1039.133776][ T7] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1039.181079][ T7] usb 1-1: config 0 descriptor?? [ 1039.252453][ T7] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1039.455690][ T7] usb 1-1: USB disconnect, device number 26 [ 1040.049663][ T7] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 1040.289712][ T7] usb 1-1: Using ep0 maxpacket: 32 [ 1040.410673][ T7] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1040.421706][ T7] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1040.433320][ T7] usb 1-1: New USB device found, idVendor=046d, idProduct=c30e, bcdDevice= 0.04 [ 1040.442573][ T7] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1040.453190][ T7] usb 1-1: config 0 descriptor?? [ 1040.490908][ T7] hub 1-1:0.0: USB hub found [ 1040.709700][ T7] hub 1-1:0.0: 1 port detected [ 1040.969834][ T7] hub 1-1:0.0: hub_hub_status failed (err = -71) [ 1040.977133][ T7] hub 1-1:0.0: config failed, can't get hub status (err -71) [ 1040.987081][ T7] usbhid 1-1:0.0: can't add hid device: -22 [ 1040.993494][ T7] usbhid: probe of 1-1:0.0 failed with error -22 [ 1041.031834][ T7] usb 1-1: USB disconnect, device number 27 00:37:08 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc218, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000090000206d040ec304000000000109022400010000a0000904000001"], 0x0) syz_usb_control_io(r1, &(0x7f0000001580)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x0, 0x0, 0x0, "c09893e1", "00eac917"}}, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:37:08 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001a80)='cmdline\x00') read$FUSE(r0, 0x0, 0x0) 00:37:08 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x40045407, 0x0) 00:37:08 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$rfkill(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) 00:37:08 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) 00:37:08 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:37:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/vlan/config\x00') read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x2020) 00:37:08 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000000c0)) 00:37:08 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps\x00') 00:37:08 executing program 4: socket$packet(0x11, 0x33ffbe997ed09d51, 0x300) [ 1041.827226][ T34] audit: type=1804 audit(1605832628.779:5101): pid=32691 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1228/bus" dev="sda1" ino=16017 res=1 errno=0 00:37:08 executing program 1: r0 = add_key(&(0x7f0000003740)='cifs.spnego\x00', &(0x7f0000003780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xf, r0, 0x0, 0x0) 00:37:08 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101a41, 0x0) [ 1041.969779][T23194] usb 1-1: new high-speed USB device number 28 using dummy_hcd [ 1042.219605][T23194] usb 1-1: Using ep0 maxpacket: 16 [ 1042.350450][T23194] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1042.371435][T23194] usb 1-1: New USB device found, idVendor=046d, idProduct=c218, bcdDevice= 0.00 [ 1042.383608][T23194] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1042.408453][T23194] usb 1-1: config 0 descriptor?? [ 1042.462224][T23194] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1042.665451][T23194] usb 1-1: USB disconnect, device number 28 [ 1043.249590][T23194] usb 1-1: new high-speed USB device number 29 using dummy_hcd [ 1043.489577][T23194] usb 1-1: Using ep0 maxpacket: 32 [ 1043.609868][T23194] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1043.620928][T23194] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1043.636662][T23194] usb 1-1: New USB device found, idVendor=046d, idProduct=c30e, bcdDevice= 0.04 [ 1043.647688][T23194] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1043.662488][T23194] usb 1-1: config 0 descriptor?? [ 1043.700720][T23194] hub 1-1:0.0: USB hub found [ 1043.919682][T23194] hub 1-1:0.0: 1 port detected [ 1044.179669][T23194] hub 1-1:0.0: hub_hub_status failed (err = -71) [ 1044.186037][T23194] hub 1-1:0.0: config failed, can't get hub status (err -71) [ 1044.198938][T23194] usbhid 1-1:0.0: can't add hid device: -22 [ 1044.206237][T23194] usbhid: probe of 1-1:0.0 failed with error -22 [ 1044.240585][T23194] usb 1-1: USB disconnect, device number 29 00:37:11 executing program 1: socket(0x2c, 0x3, 0x200) 00:37:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0x3, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x38) 00:37:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x16, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 00:37:11 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:37:11 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:37:11 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc218, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000090000206d040ec304000000000109022400010000a0000904000001"], 0x0) syz_usb_control_io(r1, &(0x7f0000001580)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x0, 0x0, 0x0, "c09893e1", "00eac917"}}, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000700)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:37:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, 0x0) 00:37:11 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='maps\x00') 00:37:11 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4c01, 0x0) [ 1045.019156][ T34] audit: type=1804 audit(1605832631.969:5102): pid=32759 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1229/bus" dev="sda1" ino=16266 res=1 errno=0 00:37:12 executing program 4: syz_open_procfs(0x0, &(0x7f00000027c0)='net/rt_cache\x00') [ 1045.199694][ T7] usb 1-1: new high-speed USB device number 30 using dummy_hcd 00:37:12 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0xc0045104, 0x0) 00:37:12 executing program 1: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000001c0)) [ 1045.459619][ T7] usb 1-1: Using ep0 maxpacket: 16 00:37:12 executing program 4: r0 = add_key(&(0x7f0000003740)='cifs.spnego\x00', &(0x7f0000003780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0x3, r0, 0x0, 0x0) [ 1045.610426][ T7] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 00:37:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) [ 1045.663453][ T7] usb 1-1: New USB device found, idVendor=046d, idProduct=c218, bcdDevice= 0.00 00:37:12 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 1045.731719][ T7] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1045.814075][ T7] usb 1-1: config 0 descriptor?? [ 1045.912425][ T7] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1046.117272][ T7] usb 1-1: USB disconnect, device number 30 [ 1046.212296][ T34] audit: type=1804 audit(1605832633.159:5103): pid=320 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1230/bus" dev="sda1" ino=16053 res=1 errno=0 [ 1046.689880][ T7] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 1046.939859][ T7] usb 1-1: Using ep0 maxpacket: 32 [ 1047.060593][ T7] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1047.079532][ T7] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1047.089363][ T7] usb 1-1: New USB device found, idVendor=046d, idProduct=c30e, bcdDevice= 0.04 [ 1047.108107][ T7] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1047.121759][ T7] usb 1-1: config 0 descriptor?? [ 1047.162290][ T7] hub 1-1:0.0: USB hub found [ 1047.369865][ T7] hub 1-1:0.0: 1 port detected 00:37:14 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:37:14 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) [ 1047.619724][ T7] hub 1-1:0.0: hub_hub_status failed (err = -71) [ 1047.626122][ T7] hub 1-1:0.0: config failed, can't get hub status (err -71) [ 1047.704635][ T7] usbhid 1-1:0.0: can't add hid device: -22 [ 1047.745338][ T7] usbhid: probe of 1-1:0.0 failed with error -22 [ 1047.791002][ T7] usb 1-1: USB disconnect, device number 31 00:37:15 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc218, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000090000206d040ec304000000000109022400010000a0000904000001"], 0x0) syz_usb_control_io(r1, &(0x7f0000001580)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x0, 0x0, 0x0, "c09893e1", "00eac917"}}, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000700)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:37:15 executing program 2: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 00:37:15 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5452, &(0x7f0000000340)) 00:37:15 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:15 executing program 1: syz_open_dev$audion(&(0x7f0000000f80)='/dev/audio#\x00', 0x1, 0x3) 00:37:15 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000100)="c9", 0x1}, {&(0x7f00000001c0)='0', 0x1}], 0x3, &(0x7f0000000440)=[{0x28, 0x0, 0x0, "47a317cf7d67a4cf2629530444a4a423a6"}], 0x28}, 0x0) 00:37:15 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x29) 00:37:15 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x19) [ 1048.356652][ T34] audit: type=1804 audit(1605832635.309:5104): pid=368 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1231/bus" dev="sda1" ino=16297 res=1 errno=0 00:37:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000100)=0x5, 0x4) 00:37:15 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_usbip_server_init(0x4) 00:37:15 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:37:15 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000300)={0x28}, 0x28) [ 1048.539846][T12603] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 1048.692692][ T382] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 1048.699569][ T382] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 1048.779676][T12603] usb 1-1: Using ep0 maxpacket: 16 [ 1048.856248][ T388] vhci_hcd: connection closed [ 1048.861817][ T157] vhci_hcd: stop threads [ 1048.900689][T12603] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1048.934552][ T157] vhci_hcd: release socket [ 1048.946027][T12603] usb 1-1: New USB device found, idVendor=046d, idProduct=c218, bcdDevice= 0.00 [ 1048.996441][ T157] vhci_hcd: disconnect device [ 1049.037467][T12603] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1049.093146][T12603] usb 1-1: config 0 descriptor?? [ 1049.142722][T12603] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1049.350068][T23194] usb 1-1: USB disconnect, device number 32 [ 1049.899822][T23194] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 1050.139584][T23194] usb 1-1: Using ep0 maxpacket: 32 [ 1050.270296][T23194] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1050.281378][T23194] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1050.293472][T23194] usb 1-1: New USB device found, idVendor=046d, idProduct=c30e, bcdDevice= 0.04 [ 1050.303089][T23194] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1050.317642][T23194] usb 1-1: config 0 descriptor?? [ 1050.371606][T23194] hub 1-1:0.0: USB hub found [ 1050.600930][T23194] hub 1-1:0.0: 1 port detected [ 1050.849637][T23194] hub 1-1:0.0: hub_hub_status failed (err = -71) [ 1050.856005][T23194] hub 1-1:0.0: config failed, can't get hub status (err -71) [ 1050.882227][T23194] usbhid 1-1:0.0: can't add hid device: -22 [ 1050.889273][T23194] usbhid: probe of 1-1:0.0 failed with error -22 [ 1050.920515][T23194] usb 1-1: USB disconnect, device number 33 00:37:18 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc218, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000090000206d040ec304000000000109022400010000a0000904000001"], 0x0) syz_usb_control_io(r1, &(0x7f0000001580)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x0, 0x0, 0x0, "c09893e1", "00eac917"}}, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000700)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:37:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) 00:37:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1cd6"], 0x1c}}, 0x0) 00:37:18 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0x0) 00:37:18 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700}, 0x9c) 00:37:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 00:37:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x20, 0x4, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 00:37:18 executing program 1: r0 = socket(0x23, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4048088) [ 1051.607786][ T34] audit: type=1804 audit(1605832638.559:5105): pid=433 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1232/bus" dev="sda1" ino=16304 res=1 errno=0 [ 1051.770091][T12603] usb 1-1: new high-speed USB device number 34 using dummy_hcd 00:37:18 executing program 1: keyctl$set_timeout(0xd, 0x0, 0x0) 00:37:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000006280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a340000000e0a01"], 0x6158}}, 0x0) 00:37:18 executing program 4: syz_open_dev$audion(&(0x7f0000002f00)='/dev/audio#\x00', 0xffffffffffffffff, 0x434403) [ 1052.019708][T12603] usb 1-1: Using ep0 maxpacket: 16 [ 1052.140293][T12603] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1052.157567][ T447] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1052.216228][T12603] usb 1-1: New USB device found, idVendor=046d, idProduct=c218, bcdDevice= 0.00 [ 1052.344141][T12603] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1052.417587][T12603] usb 1-1: config 0 descriptor?? [ 1052.482326][T12603] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1052.685662][T12603] usb 1-1: USB disconnect, device number 34 [ 1053.249589][T12603] usb 1-1: new high-speed USB device number 35 using dummy_hcd [ 1053.489567][T12603] usb 1-1: Using ep0 maxpacket: 32 [ 1053.610180][T12603] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1053.625762][T12603] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1053.640782][T12603] usb 1-1: New USB device found, idVendor=046d, idProduct=c30e, bcdDevice= 0.04 [ 1053.650839][T12603] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1053.661932][T12603] usb 1-1: config 0 descriptor?? [ 1053.700790][T12603] hub 1-1:0.0: USB hub found [ 1053.919610][T12603] hub 1-1:0.0: 1 port detected [ 1054.179661][T12603] hub 1-1:0.0: hub_hub_status failed (err = -71) [ 1054.186032][T12603] hub 1-1:0.0: config failed, can't get hub status (err -71) [ 1054.211525][T12603] usbhid 1-1:0.0: can't add hid device: -22 [ 1054.217914][T12603] usbhid: probe of 1-1:0.0 failed with error -22 [ 1054.250453][T12603] usb 1-1: USB disconnect, device number 35 00:37:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) 00:37:21 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700}, 0x9c) 00:37:21 executing program 4: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) 00:37:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 00:37:21 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:21 executing program 0: io_setup(0x2, &(0x7f0000000000)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 00:37:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 00:37:21 executing program 4: r0 = add_key(&(0x7f0000003740)='cifs.spnego\x00', &(0x7f0000003780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="12", 0x1, r1) keyctl$unlink(0x9, r0, r1) 00:37:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a10020000180a010100000000000000000300000624010380080002400000224968000380140001006970766c616e30000000000000000000140001006970365f7674693000000000000000001400010069703665727370616e300000000000001400010076657468315f6d6163767461700000001400010076657468315f746f5f68737200000000680003801400010068737230e1ff0000000000000000000014000100776c616e300000000000000000000000140001006272696467655f736c6176655f30000014000100766c616e310000000000000000000000140001006c6f00000000000000000000000000000800024000000001080001400000000008000140000000001800038014000100766c616e300000000000000000000000080001400000000008000240000007ff08000140000000000c0005400000000000000004cc0003800800014000000000540003801400010073797a6b616c6c657231000000000000140001006d6163736563300000000000000000001400010073797a6b616c6c657230000000000000140001006e72300000000000000000000000000008000140000000000800024000000040540003801400010076657468305f766972745f77696669001400010064756d6d79300000000000000000000014000100636169663000000000000000000000001400010076657468305f766c616e000000000000080001400000000020000000050a010400000000000000000c0000010900030073797a3200000000101400000c0a010200000000000000000c0000020900020073797a30000000000900010073797a300000000008000440000000020900010073797a30000000000900020073797a310000000008000440000000020900010073797a31000000000900010073797a3100000000a413038044020080a4000a8089000100d547403177b038c7d81563a80f0fce198b29ec1f96c2c6d415dc6ad3d1a6667599a5f4f073e100d79bc379dfea06c6a18347d11296ca731d27b65972596a65a65dbd3cd90af0098380ea0db5b828f8cf3d7a9a5dada0147b980a4d93570bfad2f486541da0cf1171c13a34d0cacd8b6d81562cf7827e3c794ee14bdde9cc7846dffbb90f440000001400028008000180ffffffff08000180fffffffb0c000540ffffffffffffff7f84010a801c0002800900020073797a30000000000900020073797a3000000000150001001e3e616215c6344181de6358f6309047e4000000ee000100a7658c0c2b14a7d30d64b900ddf563e2f9140c5626949ab906f660a91d547201e881c786aec5d81fd902cb279d4546fffa7028aba7acd29d27a29aa99d8a47152beb54c5b6f5b5f6fad01c76489967eaf75d51c5a7c4b89842c0333839107ae78dcb55f3217f3000ca5118cb9c997c6644d242b9dd8a0ca20e55a7b8db4c0559a805380a4ccb1872e75d1a9d07382854f2040ca90d37390ab10cc99497861cdaebf172c927a55e62f84f15e09f7775ea311d76c4fb97a3f3f6d3795c619dae951e4c0fee25a16bae439a96dbc987c5569fe033e31f8d44c17d3b4231c94cc5bd96399a141979a3abbac30000440002800900020073797a32000000000900020073797a320000000008000180fffffffd0900020073797a300000000008000180fffffffd0900020073797a31000000001800028008000180fffffffe0900020073797a3200000000040007800800034000000000280000800c00054000000000000000000c00044000000000000000070c0005400000000000000003341100800c000540000000000000000008100a800410010066f69f8432df392c97cc8eb1aecc12d00b80df6c107e4a9e0853a9276afa5a0f27e39ce8ea52fd3e21801b9cb35cdbe78b728707bd9dfbee2907e1767cdfde9f7f4ab2bd840b681db287b5eba912ac25037c97e6f33541e90759d4cf365402089a5390b5356b8eb7199e371ca3ddca647e811531397628dad138ea817676983e9472c2974e691cd62f5773cee5e3462e193b1a2fc6ea209bd168df936f7e5ffb1080172a265f7bf87715610acb90bf5b5fa8dfb1f83523ee9a62de20d12174a390c80762a8763f809d3d3f6514b3a60e2d05d44a78916bb46eb06688655475e93a2858b4d7c03bd43875ceb6beea8c7de3bf3b1c66dd4a6aab3a48aae4f206328f8f831caef3f2bafe8fea8e09868e18aac7a0bdd8a4e021ae5e533d7687ebebd2d7a77cb1567d450e30fe50d33d9782b1c28d3a723268282a7546d1916852d5b7a8e9cfa12588f24b7acd883b35772160b383ebcdfff2f5e8077ad66bd91276761c47347f709b86bb4a12b15a42f6105d410c6c023ac536bd51a984e8bc50b1c1991f1d6961cb1adfdee1f7b8af81494a5d06591d6a4307c8a2219b7343463f7e2f1cb9a73bd552b9472cdb2b127255ce8adc79c7d4f49a45860386ab373f03f5f684a839be8cc2cece45fdad15e3f2ded3f9d1af6e33d6b9375158dfb75f60d130d43bebd7e985b3b642fc1be71e1605ab3f73d0903c45f422d5a71fe46df2a5e4b17cc3b8678471901a5c68c6d0a9c5e72906088b2dbd9a56d4a8e57fd6b79f603ba96980c923c1e861eea94ea3d6e32499a083440c14b06cf8b84c093c373f2812d09a34781665a8459105b6932958f76178de620f0c86b4efb95d4de9de170037b5ca062b89c176b829a27da91df6558857b2ca0ea4d965727dacb5521ef4fa29f6beff79e6b6d8ed5ce0c3a3dc2448a0ddbb654ff422c0555ed6974f0194fd1b8b658687f58e7d8dcaad20684abc15150fefe925ddac8e1763302d1b0ca95f4011e4558c0e397da3a663759bbd850a27bd1f61985dfab84fbc7446547764a06a483bcb44632d2d06363c26e6799ceb609a250c73baee934ab17b7be22e961dd566d24c89b35a552ca137df3fcd9a8595aab2e6a702e74fb0ec7edd696072cd49d27c470ccafad9bce95c8b8d04bc73aab33bd43438d32871c6421e38ddfe3cd97160be19458a7f23b7a3d98620f77b4579ade59f2450ad532a830be922b9db13106bd11c0e9c7143f93feb6694a6b8bd0f5aab28dae815b42eb18e697bf59dd23aad2f0f1dd4d7b646bb443704e181359b282728a35bfdaa7ec433995b840d18420243579b6ef04990934eb8afb418e8e98a587b70fd0953f8a3bf96df660349957f8b6fe027be4071a6273d794eb5cb424ca98c495fe2018c63b4275d56a427911eea7c773bdcb0086bf58f9fd56bfa88b27fd30c054ec87a7a836665a8b8a508d6fa5e2c021b6e75c4edd1b1b972969d3bc7e6cf3a5ddcd7d976e235c31e2ece683ea975d02c4d5d0261d048346b9ef840b01dc6024c329ba1bcec5f3590af968a255ae8ee16248dae61353e883eafa9019c030d676027429c11cc2c04a8f70932156910b46a0abcf053b4ae09e2e21c9c998eb665701a287915a206f5e161279023cfe9c249045d7d54644ca08e3e557fba44c08acc90024ff87b772df451cfd0a13d8d4ba18eaf35575df152e686f7a51250de4f5ea9a6de7d2cd0afecceb3efb5e13de6b533f6764cdd8d34ef5afb608e2f4845993cec26f946327477ac8a42c59043224d3ee24f06904ca6f782e2f66ede9e37913a879fbbf7249cf0f6600e3a7562899318759ae3cd227bbec895f1fbd70bbb197f9ea3dffa7a11f9847bf3c7d51f4cdd04404d74346840eadb4d30009ba32e1fe8c1a356d835e89fb4dac484144bf308836fc18835884a952bd5a2fde0487b39c79f09908fcb5b5ea481f68b505e6394025f21dbde66b19952a9f0d917505f645788995ab4267b52b55f64a8648990215a76b4071a5e7a9f949dfbc55ba2123410477cb53262887aff9f1498ffce3fad8433dcd61873f2736effb56fc58d3b9fcb12ba1e7a16cd66f7f2c8c120ec4f9357e9924512d2896dfc285f188fca529be4e484dfc8d22a0729082b70ab031ffbdff7305dfd27b3a913d4b16a68eb40cccc0315e862145abe3984264d0a4d8e8021ced6586bab3c85d980b88aaa726bdd8cbc3430c33425c454482060dcffcafb8b26c5e1594830dc3cd1247f1135024d6967f475d18a0d677bfa38ac78d780df2854b733f6aea0e32766599791199abb82fdf227edde41f09e01cf012ae263e9ae8b8dda42493ef2fcdf48dc5a8abb3f6bdbd60411a284df68bbe7994fe77dadc259e969a2e9921a4bf610826f66d5c3bcfb33a0664fef29361ec256ad4ab837c2bea8b1f3bba03824013c18a6672e66f02044a8021c1be97ca0141e807af8455bbb666fcc83f9b082938b5778865d69bbd1ff344b07b4eb948c4c2e01521456f86139e92c6961695da8c26f3035d0affe2fefacd42a1c0579e475eef8b48dce7b015b72dab4fbe0b5df96762b5aac3827004c03291b980a38c9369ac791279fd4020812bef72380c0b5d650a8229906e8b11f0b13cdbfdc667e96b5c23383412fb96e84c177818f4a7268174ab068bb67c810af58929f974336a0cff91badb3311ce1c049689d0a858ffda70ce5fce288526b87545342c26defa61efca668c07fb94f0a6d518d602c98bb833d7e07666e66b0c29e8b8846f40f7a24ce636e58327e846929b1e51afed81ca29e288380d7cb4f387d4f1945b91a8c8c7609fb31c612fc230fb3b66e936c7a2c6fe0de4fcef5161b9648d6ae10e73cf0e008a7b7e06fd81993c6a748889051a8d11487249d75176c4cb5e460097141c23e70e254e3db05081fc79d8a052e533b7c335458e0361fd589a81bf2d37da0b7637bed0421b9455fd6b288943398e1c6641a2c0b8459e2d1e4e9ff4d89ec258154c81d78fe190f1c33c776d3b118e9ffa103ff4f4445a2d0991b36bb1371bf7265d9308a8a3d207b5b94187817fbc14a4165f9396f664da4f56f2df252a5efd9a7d6e187084d33c4cf852f7f93926eb854fef3d228742e21947ab9095a6544345bbd5d2fba2699a6713f6eb0ad4ea70c3e681ff15624a671476ba1831cceda46840212320b64a59181bb42152402f7e7173249670c9c160dc693921f297b05c913ed8da1a9b85eb804296322a42069ab56b5cb64b313103e6882f0dd674ae6fef2894b49e246270b27eded0962458ae72a6cd7d374288307253bb01a2b1a4dd4b57579af1446a5ec5982589e855fd5183dc0e4a8d520ee91678a9d1c207fc6e3197871256dbd420f3b45525cf64b5b55b724781ca8eec5e4474fccf0b72707e1b42ed17b51a0b87c8594fceb9aaae8ebcd1111588ad6414a96f39f51424e9589dc6904cd3c78780b9c19f0eea728f698fb40ddc938285946918f6296fe2a4731ebd73f238b96f8f0991609047bc37c8fe4c478c5f7cbd5f13910d6b2e74e1da027ec1c500d38e5f0dae57526121976e62c80e59a8476ebfae4c47eaf05cb21f38d80f2c9215ca6835e53f4bfb7e5ff42471b53fc07597afd448c6f58321f45370fc50efde2377c3af04d9deeb683ec8527760a2315317ea45b4132a723efd200f1259e9de5714c92bbdbaa4486a546bcb494c547a42a613c3530306885c14fb521e577c418ae3982570ed225ac712798f8a09c0f9a852a8ec41fa65bce370e99c59a795cf7adf6e5abe5dad11e0b6283140886b2b171764125a186cf693b624b66ba153212d03517fc1e87d2e92414f9a3087488261f4a5cf49b6679daccaa4a6119b9dbe248448c0d086213afe72ae834eb2684682e67910ccfd21d753b36e168154e0303184630865188eeada8995f0621258cb65bdcda5f08d7c7cc02f31ebd0d07ede8b73abb7f14431241748375f181521a3d4f7d3bfe185d4e24fc195a00a54b0e22a000ec3cb33d1da7d92b84a02eb6652288a9c4a591d1b9bd90ca718739a81587bac3ff5f9d5756aa1bd6e9323a8daa39fc7e12264dfbd4bf8c6e5aa941366eff03e366659852d589ee6da56bec492bd829eda20547ec3a7092701a2143ea7f55c190517bb22909a1581f38069c6dee847bb51b215cff05eb6bdf18f88db89af9575dcfc37d3f0b2e3e539f0b4b63eb5300619da19a3aa752b0072d72152de246682f85a247f85cc53521616fda3561c9a82c8cdcdaf8193bb6c8de160667782420abed2508ba6cc75e2703f27a6dd9d94462dd2326a2cb3c433275c80bee62052e6679f34ff67ef0c29aef5e9bd7401541fecc4ae1ab413c89a56e4c30a4deb136401651081cd911a18bfd1e796a42d9f89239fc1265246bc47a5370bc7fc39d077883a91ab8e3d33477f6f16cd32d8c73b4a8c3dd4c5c21cb0e636a2503ae06df80dc661a0db2b9becfb675fd3d3dc87a0027f2d5f184f4cf267d6a79ea2c635563ddefa236a3bd5c1797902c66ffb1d365ec92ae5a4cf87359105ea43a525fd10e70f7cba086ab322893adbdd55dc45b949300f3e6c5cd7df3758483107c998c82b9ac74c0e7197948ffce0e24c76770f7f4a549a2c694d3cfe7fce9362d0fc08ed872b6ac16249d39dde79cb918e99a61d08eacd724a829a98dbd08ac7fa90f5b5ffcabf98cef513dd67d3d9315824f8b5b145ac9d04a9b0dfb081776ba885ace0bd4acf55a296771da5a73b50d0c18c74ce6232592144882f4126d7c6d5b2029188b850012cd042480749649351f7ae2d88b80e185e5c7523504f95abbe5c72e34bc07ef8ed0a44100e4bc3f41fe841b7ef5c46931afd319d05bc00b60dec8663dda30f2985d2053c6ab20df0db50c19086ec05cf43387cd9fd03941eeb974d3c589ea040468ce5d8b4aeb4f734edee334bdf29f6013198cd2d4e32cd460a7c1f92c52c86fb43b225e61ceafe8a5862f870198ae30798a936a43b88e7a89f8c273a6ce52441fb30cd58469d7bba8c4dbaf3472bc978203b6326b9f37b270476a254dceb80562fbc9b5d921f400800bacfcfa36534b3cf77eafebab20da7db1d52da20db78e066cfc7cd53e794062b5e7abe6ccc63011f24688e1c1ebd92eb705ed54a190edf03b4b756e804656b1befe4d3f2e503d56ff79ed8c63f84e6486f3d52882ffd24880b6b1d0db3a70fde393791668492c1876138e31899af0773e9b6c86119d7bd33ad13849c603e559710262503f545d5dd874c3822ae47c142d90c22327a42f28ab7ebf0ca466ce626e1c97a3d64626d07632c7b14e9a5553cebb4a4fcba5591fe3d001cf1220f44f61cfb4ce1dd7bd3fdab98dd84cfa123d09641e2a383b6b8d91212496aab73f4defe55521001b4ab778c46b7abebb378cb734d37bd5f967caaa9663f040fcfc0d05da6a183493868356704e39e99d8e8c02c55871ba1d6cc584f74cbe1073884b75a57a7745d44b62d554f9650c6c8801f18e596292e3ebce4acf2d259adad574908894992cc538179ac9097e1b00f0660d1dfaf838ba408e93d5f72a1f787ba2efe10830f1524a6d557bbfc94795c2cbccef68260cc372948a516e02e696a6093f8b818faca3b1c3552fe4a5c6335e0682898ee7515221618158e959cb6003f6f7061c4305ac89f67be082b8665f4c9690a3d99e926517cb11761783f08f98da6e4db00eb9fd542d38b32bc2db72ffbdb69ea9e4c1b634dd92a064aeb759af1e5711d2df862c6ff35a31f15dd79971b321b46e3f2605831915040f57c9320a1570ecf2c51a1c010a804800028008000180ffffffff08000180fffffffd0900020073797a30000000000900020073797a320000000008000180fffffffb08000180fffffffe0900020073797a3000000000cf0001001e2a65ee847d3acd5c4c4b1cdeb5d66352322834e150a22a731b80fb130a18304b83f6370d43c0a24bfaf62d731d8415e78058b66ad251fe4287f878b277d535ec3cd464da12322fedbfc55e0f2cdf22209993ed0fcb9d65eb1ce51c04cfc9bc388ea821db6ee44c521ac489e9cd2e9e42d7f409ad2cb15ef2d75d2f290ab942e7bf7d8ddfa0a7a11ee106d775dbd3c1ac35d08fff70fdf2c5c1cb70bf18eee8381e130d5256238f93346eddaf1934fa84b6551b721a3d95c4a6fbdfd0b85745864cd5fa4cdcb55df11f86000c0400000b0a0103000000000000000005"], 0x1a94}}, 0x0) [ 1054.893504][ T34] audit: type=1804 audit(1605832641.849:5106): pid=485 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1233/bus" dev="sda1" ino=16384 res=1 errno=0 00:37:22 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'lo\x00', {'veth0_to_hsr\x00'}}) [ 1055.148331][ T499] netlink: 1016 bytes leftover after parsing attributes in process `syz-executor.1'. 00:37:22 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:37:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000006280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a"], 0x6158}}, 0x0) 00:37:22 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 00:37:22 executing program 3: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700}, 0x9c) 00:37:22 executing program 0: clock_gettime(0x6, 0x0) 00:37:22 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 00:37:22 executing program 5: write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:37:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 00:37:22 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x834}, 0x10}}, 0x0) 00:37:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x300}, 0x0) 00:37:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) 00:37:23 executing program 1: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000020c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1056.210320][ T534] fuse: Bad value for 'fd' [ 1056.227402][ T34] audit: type=1804 audit(1605832643.179:5107): pid=532 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1234/bus" dev="sda1" ino=16381 res=1 errno=0 [ 1056.265849][ T534] fuse: Bad value for 'fd' 00:37:23 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x5421, 0x0) 00:37:23 executing program 2: add_key(&(0x7f0000000000)='ceph\x00', 0x0, &(0x7f0000000080)="29ad109eb73fd7c4ddc25bbe", 0xc, 0xfffffffffffffffd) 00:37:23 executing program 0: syz_open_dev$dri(&(0x7f00000008c0)='/dev/dri/card#\x00', 0x0, 0x80481) 00:37:23 executing program 1: syz_mount_image$v7(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) 00:37:23 executing program 2: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) recvmsg(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x0) 00:37:23 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x490100, 0x0) 00:37:24 executing program 5: write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:37:24 executing program 3: syz_mount_image$fuse(&(0x7f0000000100)='fuse\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 00:37:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000006280)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x6158}}, 0x0) 00:37:24 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001a80)='cmdline\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r1}) 00:37:24 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, 0xfffffffffffffffe, 0x0) 00:37:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x14, 0x7, 0xa, 0x3}, 0x14}}, 0x0) [ 1057.158031][ T560] fuse: Bad value for 'fd' [ 1057.186667][ T560] fuse: Bad value for 'fd' 00:37:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountstats\x00') read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 00:37:24 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0xc074510c, 0x0) 00:37:24 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5451, 0x0) 00:37:24 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x0) 00:37:24 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000700)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, 0x0) [ 1057.389214][ T34] audit: type=1804 audit(1605832644.339:5108): pid=567 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1235/bus" dev="sda1" ino=16302 res=1 errno=0 00:37:24 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9}, 0x0) 00:37:25 executing program 5: write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:37:25 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 00:37:25 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='projid_map\x00') read$FUSE(r0, 0x0, 0x0) 00:37:25 executing program 4: add_key$keyring(&(0x7f0000000440)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 00:37:25 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000001b00), 0x0, 0x0, &(0x7f0000002b80)={0x0}) 00:37:25 executing program 0: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000002c0)='asymmetric\x00', 0x0, 0x0, 0x0, r0) 00:37:25 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) 00:37:25 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:25 executing program 4: syz_open_dev$vivid(0x0, 0x2, 0x2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x40480) 00:37:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r1}}, 0x18) 00:37:25 executing program 1: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000300)) [ 1058.533739][ T34] audit: type=1804 audit(1605832645.489:5109): pid=598 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1236/bus" dev="sda1" ino=16347 res=1 errno=0 00:37:25 executing program 4: r0 = gettid() rt_sigqueueinfo(r0, 0x20, &(0x7f0000000280)) [ 1058.621048][ T604] loop0: detected capacity change from 0 to 324608 [ 1058.675515][ T604] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1058.761847][ T604] EXT4-fs (loop0): failed to parse options in superblock:  [ 1058.856885][ T604] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1058.895179][ T604] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:26 executing program 5: r0 = open(0x0, 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:26 executing program 3: fanotify_mark(0xffffffffffffffff, 0x0, 0x1640ead7eee00094, 0xffffffffffffffff, 0x0) 00:37:26 executing program 2: syz_open_procfs(0x0, &(0x7f0000000200)='net/rfcomm\x00') 00:37:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') read$FUSE(r0, 0x0, 0x0) 00:37:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x40) 00:37:26 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:26 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) [ 1059.507897][ T637] loop0: detected capacity change from 0 to 324608 00:37:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000004ac0)={0x77359400}) [ 1059.564201][ T637] EXT4-fs (loop0): Unrecognized mount option "" or missing value 00:37:26 executing program 4: syz_mount_image$fuse(&(0x7f0000000080)='fuse\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=', @ANYRESDEC]) 00:37:26 executing program 1: r0 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='*', 0x1, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) [ 1059.625951][ T637] EXT4-fs (loop0): failed to parse options in superblock:  [ 1059.708098][ T637] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1059.757318][ T637] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:26 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1059.832327][ T34] audit: type=1804 audit(1605832646.789:5110): pid=644 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1237/bus" dev="sda1" ino=16359 res=1 errno=0 00:37:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 1059.938409][ T653] fuse: Bad value for 'fd' [ 1059.963591][ T653] fuse: Bad value for 'fd' [ 1060.163452][ T657] loop0: detected capacity change from 0 to 324608 [ 1060.229254][ T657] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1060.275575][ T657] EXT4-fs (loop0): failed to parse options in superblock:  [ 1060.326519][ T657] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1060.351427][ T657] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:27 executing program 5: r0 = open(0x0, 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:27 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3ea}, 0x10}}, 0x0) 00:37:27 executing program 1: syz_open_dev$vivid(0x0, 0x2, 0x2) 00:37:27 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000040)={0x0, 0x9, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7a0a8883"}, 0x0, 0x0, @fd}) 00:37:27 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7a0a8883"}, 0x0, 0x0, @fd}) 00:37:27 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:27 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000002f00)='/dev/audio#\x00', 0x1, 0x64401) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) getgid() openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000038c0)={0x78, 0x0, 0x0, {0x0, 0x280, 0x0, {0x0, 0x0, 0x230, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xa000, 0x0, 0x0, 0x0, 0x7f, 0x7}}}, 0x78) getresuid(0x0, &(0x7f00000001c0), &(0x7f0000000200)) 00:37:27 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0, 0x0, 0x38}, 0x10) [ 1060.796117][ T675] loop0: detected capacity change from 0 to 324608 [ 1060.858369][ T675] EXT4-fs (loop0): Unrecognized mount option "" or missing value 00:37:27 executing program 2: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 1060.915470][ T675] EXT4-fs (loop0): failed to parse options in superblock:  00:37:27 executing program 4: add_key(&(0x7f0000003740)='cifs.spnego\x00', &(0x7f0000003780)={'syz', 0x2, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1061.017940][ T675] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1061.065638][ T675] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:28 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/dlm-control\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x6) 00:37:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x4000000, &(0x7f0000000280)={&(0x7f0000000240)=@bridge_getneigh={0x20, 0x1e, 0xb0b, 0x0, 0x0, {0x0}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) [ 1061.290004][ T34] audit: type=1804 audit(1605832648.249:5111): pid=689 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1238/bus" dev="sda1" ino=16383 res=1 errno=0 00:37:28 executing program 5: r0 = open(0x0, 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:28 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:28 executing program 2: keyctl$set_timeout(0x12, 0x0, 0x0) 00:37:28 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udp6\x00') read$FUSE(r0, 0x0, 0x0) 00:37:28 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000001c80)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000001cc0)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "499ca57d"}}) [ 1061.555737][ T706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1061.645647][ T34] audit: type=1804 audit(1605832648.599:5112): pid=707 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1239/bus" dev="sda1" ino=16359 res=1 errno=0 [ 1061.695761][ T712] loop0: detected capacity change from 0 to 324608 00:37:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0)={'syz', 0x2}, &(0x7f0000000800)="c9", 0x1, r0) keyctl$read(0xb, r1, &(0x7f0000000900)=""/228, 0xe4) 00:37:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x3, 0x4, 0x800002, 0x0, 0x1}, 0x40) 00:37:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x4000000, &(0x7f0000000280)={&(0x7f0000000240)=@bridge_getneigh={0x20, 0x1e, 0xb0b, 0x0, 0x0, {0x0}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) [ 1061.834374][ T712] EXT4-fs (loop0): revision level too high, forcing read-only mode 00:37:28 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x6000, 0x0) [ 1061.958297][ T712] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1061.991117][ T719] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 00:37:29 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) 00:37:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x4000000, &(0x7f0000000280)={&(0x7f0000000240)=@bridge_getneigh={0x20, 0x1e, 0xb0b, 0x0, 0x0, {0x0}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) 00:37:29 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) [ 1062.417713][ T734] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 00:37:29 executing program 1: add_key(&(0x7f00000000c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:37:29 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:29 executing program 2: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, 0xfffffffffffffffe) 00:37:29 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:37:29 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000480)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3b0, 0x0, 0x2b8, 0xc0, 0x2b8, 0xc0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x6, 0x0, {[{{@ip={@broadcast, @private, 0x0, 0x0, 'veth1_to_bond\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@TOS={0x28, 'TOS\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00'}}, {{@ip={@local, @private, 0x0, 0x0, 'caif0\x00', 'vxcan1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) [ 1062.618466][ T740] loop0: detected capacity change from 0 to 324608 00:37:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x7ffff000}, 0x14}}, 0x0) 00:37:29 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1b41a24f"}, 0x0, 0x0, @fd}) [ 1062.731319][ T740] EXT4-fs (loop0): revision level too high, forcing read-only mode 00:37:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0)={'syz', 0x2}, &(0x7f0000000800)="c9", 0x1, r0) keyctl$read(0xb, r1, 0x0, 0x0) [ 1062.809022][ T740] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:37:29 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000001a80)='cmdline\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') [ 1062.924988][ T34] audit: type=1804 audit(1605832649.879:5113): pid=751 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1240/bus" dev="sda1" ino=16379 res=1 errno=0 00:37:30 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000240), 0x79a8) 00:37:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111}}, 0x20) 00:37:30 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)="a9", 0x1, r0) 00:37:30 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x203, 0x0) read$FUSE(r0, 0x0, 0x0) 00:37:30 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000036c0)={0x0, @l2tp={0x2, 0x0, @multicast1}, @l2tp={0x2, 0x0, @local}, @xdp}) [ 1063.386594][ T771] loop0: detected capacity change from 0 to 324608 [ 1063.480625][ T771] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1063.507402][ T771] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:37:30 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:30 executing program 2: syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x0) 00:37:30 executing program 3: add_key(&(0x7f0000003740)='cifs.spnego\x00', &(0x7f0000003780)={'syz', 0x2}, 0x0, 0x700, 0xfffffffffffffffd) 00:37:30 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x40045108, 0x0) 00:37:30 executing program 4: r0 = add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="d5", 0x1, 0xfffffffffffffffb) keyctl$get_security(0x11, r0, 0x0, 0x0) 00:37:30 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:30 executing program 4: r0 = add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="d5", 0x1, 0xfffffffffffffffb) keyctl$get_security(0x11, r0, 0x0, 0x0) 00:37:30 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78}, 0x78) [ 1063.857936][ T792] loop0: detected capacity change from 0 to 324608 [ 1063.897960][ T792] EXT4-fs (loop0): Unrecognized mount option "" or missing value 00:37:30 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/dev_mcast\x00') read$FUSE(r0, 0x0, 0x0) 00:37:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) [ 1063.930219][ T792] EXT4-fs (loop0): failed to parse options in superblock:  [ 1063.958446][ T792] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1064.006517][ T792] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:31 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5450, 0x0) [ 1064.097847][ T34] audit: type=1804 audit(1605832651.049:5114): pid=797 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1241/bus" dev="sda1" ino=16341 res=1 errno=0 00:37:31 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1064.499798][ T812] loop0: detected capacity change from 0 to 324608 [ 1064.522545][ T812] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1064.541147][ T812] EXT4-fs (loop0): failed to parse options in superblock:  [ 1064.595422][ T812] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1064.610833][ T812] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:31 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:31 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pkey_alloc(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) 00:37:31 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0xffffffffffffffff) 00:37:31 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x5451, 0x0) 00:37:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:31 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1064.953318][ T826] loop0: detected capacity change from 0 to 324608 [ 1064.980028][ T826] EXT4-fs (loop0): Unrecognized mount option "" or missing value 00:37:32 executing program 2: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) [ 1065.058031][ T826] EXT4-fs (loop0): failed to parse options in superblock:  00:37:32 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@buf) [ 1065.131624][ T826] EXT4-fs (loop0): revision level too high, forcing read-only mode 00:37:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0x3, {0x0}}, 0x18) [ 1065.230802][ T826] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:32 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0xa0180, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5450, 0x0) [ 1065.367605][ T34] audit: type=1804 audit(1605832652.319:5115): pid=840 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1242/bus" dev="sda1" ino=16359 res=1 errno=0 00:37:32 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1065.655110][ T854] loop0: detected capacity change from 0 to 324608 [ 1065.678450][ T854] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1065.711355][ T854] EXT4-fs (loop0): failed to parse options in superblock:  [ 1065.747143][ T854] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1065.772732][ T854] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:33 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[{0x10}], 0x10}, 0x0) 00:37:33 executing program 1: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000280)={0x0, 0x0, 0xfdffffff}) 00:37:33 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c92608a"}, 0x0, 0x0, @fd}) 00:37:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:33 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:33 executing program 0: memfd_create(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:33 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5421, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000080)=[@release], 0x0, 0x0, 0x0}) [ 1066.255040][ T868] loop0: detected capacity change from 0 to 324608 [ 1066.273416][ T868] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1066.287562][ T868] EXT4-fs (loop0): failed to parse options in superblock:  00:37:33 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 1066.327977][ T868] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1066.348704][ T868] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x16, 0x10, 0xfa00, {0x0}}, 0x18) 00:37:33 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:33 executing program 0: memfd_create(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:33 executing program 2: r0 = gettid() rt_sigqueueinfo(r0, 0xb, &(0x7f0000000000)) 00:37:33 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000003740)='cifs.spnego\x00', &(0x7f0000003780)={'syz', 0x1}, 0x0, 0x0, r0) [ 1066.749698][ T34] audit: type=1804 audit(1605832653.699:5116): pid=887 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1243/bus" dev="sda1" ino=16360 res=1 errno=0 00:37:33 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x10}, 0x200001d0}}, 0x0) [ 1066.919852][ T896] loop0: detected capacity change from 0 to 324608 [ 1066.947999][ T896] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1066.956462][ T896] EXT4-fs (loop0): failed to parse options in superblock:  00:37:33 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000), 0x10) [ 1066.979177][ T896] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1067.010769][ T896] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:34 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:34 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:34 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001ac0)={0x2020}, 0x2020) 00:37:34 executing program 0: memfd_create(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:34 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000), 0x10) 00:37:34 executing program 4: getrusage(0xffffffffffffffff, &(0x7f0000000440)) 00:37:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1067.653712][ T912] loop0: detected capacity change from 0 to 324608 00:37:34 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x901, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:37:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) [ 1067.707529][ T912] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1067.800835][ T912] EXT4-fs (loop0): failed to parse options in superblock:  00:37:34 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001a80)='cmdline\x00') read$FUSE(r0, &(0x7f0000001ac0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000003b00)={0x2020}, 0x2020) [ 1067.869739][ T912] EXT4-fs (loop0): revision level too high, forcing read-only mode 00:37:34 executing program 0: memfd_create(0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1067.913270][ T912] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue [ 1068.134461][ T34] audit: type=1804 audit(1605832655.079:5117): pid=938 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1244/bus" dev="sda1" ino=16379 res=1 errno=0 [ 1068.158742][ T941] loop0: detected capacity change from 0 to 324608 [ 1068.225559][ T941] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1068.249767][ T941] EXT4-fs (loop0): failed to parse options in superblock:  [ 1068.267370][ T941] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1068.293550][ T941] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:35 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x38) 00:37:35 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:35 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x61}, 0x0) 00:37:35 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x22002, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x5100, 0x0) 00:37:35 executing program 0: memfd_create(0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:35 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201}, 0x14}}, 0x0) 00:37:35 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x5402, 0x0) ioctl$SNDCTL_SEQ_RESET(r0, 0x5100) 00:37:35 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)={0x7, 0x41, "81592c9e923f3d92561655bb3bf91f8b8432466c6cdc1efdd54353c475c6ed89bc9158dd69430bdca8218937b8a5c4488744dde823bf22e5986c0f19cbebae9b44"}) [ 1068.935475][ T963] loop0: detected capacity change from 0 to 324608 00:37:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000006700)='net/ip_tables_targets\x00') read$FUSE(r0, &(0x7f0000002600)={0x2020}, 0x2020) [ 1069.040463][ T963] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1069.048322][ T963] EXT4-fs (loop0): failed to parse options in superblock:  00:37:36 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x1e, 0x2, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 00:37:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) connect$nfc_raw(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r1, r0}}, 0x18) [ 1069.160550][ T963] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1069.234630][ T963] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue [ 1069.451357][ T34] audit: type=1804 audit(1605832656.399:5118): pid=985 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1245/bus" dev="sda1" ino=16359 res=1 errno=0 00:37:37 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:37 executing program 4: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000400)) 00:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, 0x0, 0x0) 00:37:37 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='mounts\x00') 00:37:37 executing program 0: memfd_create(0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:37 executing program 2: creat(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x24084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, &(0x7f0000000280)={'U-', 0x7}, 0x16, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigpending(&(0x7f0000000040), 0x8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000140)={@remote, @local, @private=0xa010101}, 0xc) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) arch_prctl$ARCH_GET_GS(0x1004, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x152) poll(0x0, 0x0, 0x204) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x40000006) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, 0x0, 0x0) [ 1070.340598][ T995] loop0: detected capacity change from 0 to 324608 [ 1070.389567][ T995] EXT4-fs (loop0): Unrecognized mount option "" or missing value 00:37:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:37 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0xc08c5102, 0x0) [ 1070.445590][ T995] EXT4-fs (loop0): failed to parse options in superblock:  [ 1070.458585][ T995] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1070.471273][ T995] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, 0x0, 0x0) 00:37:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') [ 1070.782960][ T1017] loop0: detected capacity change from 0 to 324608 00:37:37 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xb000) [ 1070.853956][ T1017] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1070.862513][ T1017] EXT4-fs (loop0): failed to parse options in superblock:  [ 1070.885368][ T34] audit: type=1804 audit(1605832657.839:5119): pid=1024 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1246/bus" dev="sda1" ino=15826 res=1 errno=0 [ 1070.935983][ T1017] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1070.984161][ T1017] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:38 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='big_key\x00', 0x0, &(0x7f0000000140)='N', 0x1, r0) 00:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 00:37:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 00:37:38 executing program 2: creat(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x24084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, &(0x7f0000000280)={'U-', 0x7}, 0x16, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigpending(&(0x7f0000000040), 0x8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000140)={@remote, @local, @private=0xa010101}, 0xc) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) arch_prctl$ARCH_GET_GS(0x1004, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x152) poll(0x0, 0x0, 0x204) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x40000006) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:37:38 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1071.551203][ T1040] loop0: detected capacity change from 0 to 324608 00:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 1071.684959][ T1040] EXT4-fs (loop0): Unrecognized mount option "" or missing value 00:37:38 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername$inet6(r0, 0x0, 0x0) 00:37:38 executing program 2: add_key(&(0x7f0000003740)='cifs.spnego\x00', &(0x7f0000003780)={'syz', 0x2, 0x7}, 0x0, 0x0, 0xfffffffffffffffd) 00:37:38 executing program 4: add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)='\x00\xc5\xd27\xd9MKtl\x97\x97\xfb-\xcd\x86\xb7\xc3Rv\x9d,8vn_K\xd3\xdc\x11\xaf\xf3Z\xef\xeem\x05\xe5X\x9cN\xa9\xb5*w\xff\b-\x11\x01^\xbf\x8a\r{\xfa\xe4\x93\xa9JH\xc2`I\xa5\xecW\xf1\x9e3#\b\xab2\xe1j,\x96P\xbaK\xd3\x15\x96\x13\f\x10\xd6O\x93\x0f\xd3\x0e\xaa\'\xe5G\x92\xe9\xda\xcc\x94\xe3\x1e\xe8\xc9\xc5\n\x15\xadj\x0fY\xf1\xc6\xa9\x13\x18\x151G\x0fO\r\x9f\x96\xa4\xf5\xaa', 0x0) [ 1071.811481][ T1040] EXT4-fs (loop0): failed to parse options in superblock:  00:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 1071.898459][ T1040] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1071.936645][ T1040] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:39 executing program 2: add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0)={'syz', 0x2}, &(0x7f0000000800)='L', 0x20000801, 0x0) [ 1072.284151][ T34] audit: type=1804 audit(1605832659.239:5120): pid=1064 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1247/bus" dev="sda1" ino=16179 res=1 errno=0 00:37:39 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:39 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1a94}}, 0x0) 00:37:39 executing program 1: sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r0, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x1}, 0x8) 00:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:37:39 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001080), 0x0, &(0x7f00000010c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}]}) [ 1072.910495][ T1077] loop0: detected capacity change from 0 to 324608 00:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 1072.970455][ T1080] tmpfs: Bad value for 'nr_inodes' [ 1073.018058][ T1077] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1073.025392][ T1080] tmpfs: Bad value for 'nr_inodes' 00:37:40 executing program 2: sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket(0x10, 0x803, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x114, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r2, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x1}, 0x8) 00:37:40 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x40049409, 0x0) [ 1073.060850][ T1077] EXT4-fs (loop0): failed to parse options in superblock:  00:37:40 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/handlers\x00', 0x0, 0x0) [ 1073.136254][ T1077] EXT4-fs (loop0): revision level too high, forcing read-only mode 00:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 1073.233006][ T1077] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue [ 1073.377178][ T34] audit: type=1804 audit(1605832660.329:5121): pid=1102 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1248/bus" dev="sda1" ino=16065 res=1 errno=0 00:37:40 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1073.588897][ T1116] loop0: detected capacity change from 0 to 324608 [ 1073.630554][ T1116] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1073.638385][ T1116] EXT4-fs (loop0): failed to parse options in superblock:  [ 1073.692539][ T1116] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1073.710472][ T1116] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:40 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:40 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 00:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3}, 0x14}}, 0x0) 00:37:40 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0x80045105, 0x0) 00:37:40 executing program 2: r0 = add_key(&(0x7f0000003740)='cifs.spnego\x00', &(0x7f0000003780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0x16, r0, 0x0, 0x0) 00:37:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) [ 1074.112424][ T1130] loop0: detected capacity change from 0 to 324608 00:37:41 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) dup2(r0, r1) [ 1074.168872][ T1130] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1074.201243][ T1130] EXT4-fs (loop0): failed to parse options in superblock:  00:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3}, 0x14}}, 0x0) 00:37:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000140)="9d017b1df9943a34edb366993660c87f108bbf0c", 0x14, 0x0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa) [ 1074.216678][ T1130] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1074.234401][ T1130] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:41 executing program 4: socketpair(0x2, 0x0, 0x4, 0x0) [ 1074.559690][ T1151] loop0: detected capacity change from 0 to 324608 [ 1074.612843][ T1151] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1074.641083][ T1151] EXT4-fs (loop0): failed to parse options in superblock:  [ 1074.647938][ T34] audit: type=1804 audit(1605832661.599:5122): pid=1156 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1249/bus" dev="sda1" ino=16359 res=1 errno=0 [ 1074.718441][ T1151] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1074.760798][ T1151] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:42 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:42 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) 00:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3}, 0x14}}, 0x0) 00:37:42 executing program 4: poll(&(0x7f0000000180)=[{}, {}], 0x13b, 0x0) 00:37:42 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2, 0x0) 00:37:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1075.400582][ T1172] loop0: detected capacity change from 0 to 324608 [ 1075.432158][ T1172] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1075.440292][ T1172] EXT4-fs (loop0): failed to parse options in superblock:  00:37:42 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) poll(&(0x7f0000000180)=[{r0, 0x4}], 0x1, 0x0) 00:37:42 executing program 2: socketpair(0x0, 0x0, 0x1, 0x0) 00:37:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 00:37:42 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001840)={0x0, 0xa, &(0x7f0000001580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 1075.490993][ T1172] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1075.517178][ T1172] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:42 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x8e) 00:37:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1075.909842][ T34] audit: type=1804 audit(1605832662.859:5123): pid=1187 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1250/bus" dev="sda1" ino=16350 res=1 errno=0 [ 1075.992141][ T1197] loop0: detected capacity change from 0 to 324608 [ 1076.033803][ T1197] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1076.049281][ T1197] EXT4-fs (loop0): failed to parse options in superblock:  [ 1076.078050][ T1197] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1076.104383][ T1197] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:43 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:43 executing program 2: fchownat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) 00:37:43 executing program 3: 00:37:43 executing program 4: 00:37:43 executing program 1: 00:37:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:43 executing program 4: 00:37:43 executing program 1: 00:37:43 executing program 3: 00:37:43 executing program 2: [ 1076.679196][ T1213] loop0: detected capacity change from 0 to 324608 [ 1076.736376][ T1213] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1076.753655][ T1213] EXT4-fs (loop0): failed to parse options in superblock:  00:37:43 executing program 1: [ 1076.817541][ T1213] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1076.837015][ T1213] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue 00:37:43 executing program 3: [ 1077.095728][ T34] audit: type=1804 audit(1605832664.029:5124): pid=1226 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1251/bus" dev="sda1" ino=16372 res=1 errno=0 00:37:44 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:44 executing program 4: 00:37:44 executing program 2: 00:37:44 executing program 1: 00:37:44 executing program 3: 00:37:44 executing program 3: 00:37:44 executing program 4: [ 1077.814049][ T1240] loop0: detected capacity change from 0 to 324608 00:37:44 executing program 1: 00:37:44 executing program 1: 00:37:44 executing program 2: [ 1077.910591][ T1240] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1077.950435][ T1240] EXT4-fs (loop0): failed to parse options in superblock:  00:37:45 executing program 4: [ 1078.041451][ T1240] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1078.098976][ T1240] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue [ 1078.276154][ T34] audit: type=1804 audit(1605832665.229:5125): pid=1254 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1252/bus" dev="sda1" ino=16098 res=1 errno=0 00:37:45 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:45 executing program 4: 00:37:45 executing program 1: 00:37:45 executing program 3: 00:37:45 executing program 2: 00:37:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:46 executing program 3: 00:37:46 executing program 1: 00:37:46 executing program 4: [ 1079.067133][ T1263] loop0: detected capacity change from 0 to 324608 00:37:46 executing program 2: 00:37:46 executing program 4: 00:37:46 executing program 3: [ 1079.191516][ T1263] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1079.218534][ T1263] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1079.521066][ T34] audit: type=1804 audit(1605832666.479:5126): pid=1277 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1253/bus" dev="sda1" ino=16358 res=1 errno=0 00:37:47 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:47 executing program 4: 00:37:47 executing program 1: 00:37:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:47 executing program 2: 00:37:47 executing program 3: 00:37:47 executing program 1: 00:37:47 executing program 3: 00:37:47 executing program 4: [ 1080.386069][ T1287] loop0: detected capacity change from 0 to 324608 00:37:47 executing program 2: [ 1080.500048][ T1287] EXT4-fs (loop0): revision level too high, forcing read-only mode 00:37:47 executing program 3: [ 1080.583070][ T1287] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:37:47 executing program 2: [ 1080.749681][ T34] audit: type=1804 audit(1605832667.709:5127): pid=1299 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1254/bus" dev="sda1" ino=16343 res=1 errno=0 00:37:48 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:48 executing program 1: 00:37:48 executing program 3: 00:37:48 executing program 4: 00:37:48 executing program 2: 00:37:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:48 executing program 1: 00:37:48 executing program 3: [ 1081.567280][ T1312] loop0: detected capacity change from 0 to 324608 00:37:48 executing program 2: 00:37:48 executing program 4: [ 1081.651196][ T1312] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1081.686553][ T1312] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:37:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:48 executing program 3: [ 1081.987995][ T34] audit: type=1804 audit(1605832668.939:5128): pid=1325 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1255/bus" dev="sda1" ino=16381 res=1 errno=0 [ 1082.040248][ T1328] loop0: detected capacity change from 0 to 324608 00:37:49 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:49 executing program 1: 00:37:49 executing program 2: 00:37:49 executing program 4: 00:37:49 executing program 3: 00:37:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:49 executing program 3: 00:37:49 executing program 4: 00:37:49 executing program 1: 00:37:49 executing program 2: [ 1082.852420][ T1341] loop0: detected capacity change from 0 to 324608 00:37:49 executing program 4: 00:37:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1083.184556][ T1353] loop0: detected capacity change from 0 to 324608 [ 1083.229665][ T34] audit: type=1804 audit(1605832670.169:5129): pid=1355 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1256/bus" dev="sda1" ino=16353 res=1 errno=0 00:37:50 executing program 2: 00:37:50 executing program 4: 00:37:50 executing program 3: 00:37:50 executing program 1: 00:37:50 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:51 executing program 3: [ 1084.086859][ T1368] loop0: detected capacity change from 0 to 324608 00:37:51 executing program 2: 00:37:51 executing program 1: 00:37:51 executing program 4: 00:37:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:51 executing program 4: 00:37:51 executing program 2: 00:37:51 executing program 3: 00:37:51 executing program 1: [ 1084.390054][ T34] audit: type=1804 audit(1605832671.349:5130): pid=1379 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1257/bus" dev="sda1" ino=16355 res=1 errno=0 [ 1084.443501][ T1381] loop0: detected capacity change from 0 to 324608 00:37:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1084.751692][ T1393] loop0: detected capacity change from 0 to 324608 00:37:52 executing program 1: 00:37:52 executing program 3: 00:37:52 executing program 2: 00:37:52 executing program 4: 00:37:52 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:52 executing program 3: 00:37:52 executing program 2: 00:37:52 executing program 4: 00:37:52 executing program 1: [ 1085.208138][ T1406] loop0: detected capacity change from 0 to 71680 00:37:52 executing program 4: [ 1085.320824][ T1406] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1085.353699][ T1406] EXT4-fs (loop0): failed to parse options in superblock:  [ 1085.376130][ T1406] EXT4-fs (loop0): bad geometry: block count 256 exceeds size of device (70 blocks) 00:37:52 executing program 1: 00:37:52 executing program 3: 00:37:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1085.485640][ T34] audit: type=1804 audit(1605832672.439:5131): pid=1418 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1258/bus" dev="sda1" ino=16347 res=1 errno=0 00:37:52 executing program 2: 00:37:52 executing program 4: [ 1085.763825][ T1425] loop0: detected capacity change from 0 to 71680 [ 1085.829079][ T1425] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1085.904074][ T1425] EXT4-fs (loop0): failed to parse options in superblock:  [ 1085.952416][ T1425] EXT4-fs (loop0): bad geometry: block count 256 exceeds size of device (70 blocks) 00:37:53 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:53 executing program 1: 00:37:53 executing program 3: 00:37:53 executing program 4: 00:37:53 executing program 2: 00:37:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:53 executing program 3: [ 1086.299834][ T1435] loop0: detected capacity change from 0 to 71680 00:37:53 executing program 4: [ 1086.356553][ T1435] EXT4-fs (loop0): Unrecognized mount option "" or missing value 00:37:53 executing program 2: 00:37:53 executing program 1: 00:37:53 executing program 3: [ 1086.414293][ T1435] EXT4-fs (loop0): failed to parse options in superblock:  [ 1086.426962][ T1435] EXT4-fs (loop0): bad geometry: block count 256 exceeds size of device (70 blocks) [ 1086.554488][ T34] audit: type=1804 audit(1605832673.509:5132): pid=1445 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1259/bus" dev="sda1" ino=16146 res=1 errno=0 00:37:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:54 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:54 executing program 2: 00:37:54 executing program 4: 00:37:54 executing program 3: 00:37:54 executing program 1: 00:37:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:54 executing program 1: 00:37:54 executing program 3: 00:37:54 executing program 4: 00:37:54 executing program 2: 00:37:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:54 executing program 1: [ 1087.725184][ T34] audit: type=1804 audit(1605832674.679:5133): pid=1471 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1260/bus" dev="sda1" ino=16342 res=1 errno=0 00:37:55 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:55 executing program 3: 00:37:55 executing program 4: 00:37:55 executing program 2: 00:37:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:55 executing program 1: 00:37:55 executing program 1: 00:37:55 executing program 2: 00:37:55 executing program 4: [ 1088.575027][ T1484] loop0: detected capacity change from 0 to 324608 00:37:55 executing program 3: [ 1088.646771][ T1484] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1088.713798][ T1484] EXT4-fs (loop0): get root inode failed [ 1088.724391][ T1484] EXT4-fs (loop0): mount failed 00:37:55 executing program 1: 00:37:55 executing program 3: [ 1089.007005][ T34] audit: type=1804 audit(1605832675.959:5134): pid=1498 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1261/bus" dev="sda1" ino=16342 res=1 errno=0 00:37:56 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:56 executing program 2: 00:37:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:56 executing program 4: 00:37:56 executing program 1: 00:37:56 executing program 3: [ 1090.043430][ T1506] loop0: detected capacity change from 0 to 324608 00:37:57 executing program 4: 00:37:57 executing program 3: 00:37:57 executing program 2: 00:37:57 executing program 1: [ 1090.192468][ T1506] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated 00:37:57 executing program 3: [ 1090.267822][ T1506] EXT4-fs (loop0): get root inode failed 00:37:57 executing program 2: [ 1090.360473][ T1506] EXT4-fs (loop0): mount failed [ 1090.525059][ T34] audit: type=1804 audit(1605832677.479:5135): pid=1520 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1262/bus" dev="sda1" ino=16342 res=1 errno=0 00:37:58 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:37:58 executing program 4: 00:37:58 executing program 3: 00:37:58 executing program 1: 00:37:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:58 executing program 2: 00:37:58 executing program 2: 00:37:58 executing program 1: [ 1091.512732][ T1529] loop0: detected capacity change from 0 to 324608 00:37:58 executing program 3: 00:37:58 executing program 4: 00:37:58 executing program 2: 00:37:58 executing program 3: [ 1091.672781][ T1529] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1091.727147][ T1529] EXT4-fs (loop0): get root inode failed [ 1091.762459][ T1529] EXT4-fs (loop0): mount failed [ 1091.973808][ T34] audit: type=1804 audit(1605832678.929:5136): pid=1543 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1263/bus" dev="sda1" ino=16360 res=1 errno=0 00:37:59 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:37:59 executing program 4: 00:37:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {0x0, 0x0, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:37:59 executing program 1: 00:37:59 executing program 3: 00:37:59 executing program 2: 00:37:59 executing program 2: [ 1092.997082][ T1552] loop0: detected capacity change from 0 to 324608 00:38:00 executing program 3: 00:38:00 executing program 4: 00:38:00 executing program 1: [ 1093.111687][ T1552] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated 00:38:00 executing program 4: [ 1093.167511][ T1552] EXT4-fs (loop0): get root inode failed [ 1093.199068][ T1552] EXT4-fs (loop0): mount failed 00:38:00 executing program 2: [ 1093.327313][ T34] audit: type=1804 audit(1605832680.279:5137): pid=1563 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1264/bus" dev="sda1" ino=16384 res=1 errno=0 00:38:00 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:38:00 executing program 3: 00:38:00 executing program 1: 00:38:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {0x0, 0x0, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:00 executing program 2: 00:38:00 executing program 4: 00:38:01 executing program 3: [ 1094.126597][ T1578] loop0: detected capacity change from 0 to 324608 00:38:01 executing program 1: [ 1094.220451][ T34] audit: type=1804 audit(1605832681.179:5138): pid=1580 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1265/bus" dev="sda1" ino=16353 res=1 errno=0 00:38:01 executing program 3: 00:38:01 executing program 2: 00:38:01 executing program 4: [ 1094.263070][ T1578] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1094.284460][ T1578] EXT4-fs (loop0): get root inode failed [ 1094.298297][ T1578] EXT4-fs (loop0): mount failed 00:38:01 executing program 2: 00:38:01 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:38:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {0x0, 0x0, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:01 executing program 1: 00:38:01 executing program 3: 00:38:01 executing program 4: 00:38:01 executing program 2: [ 1094.986705][ T1599] loop0: detected capacity change from 0 to 324608 00:38:02 executing program 1: 00:38:02 executing program 3: [ 1095.085275][ T1599] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1095.099207][ T1599] EXT4-fs (loop0): get root inode failed [ 1095.116139][ T1599] EXT4-fs (loop0): mount failed 00:38:02 executing program 2: 00:38:02 executing program 4: [ 1095.292084][ T34] audit: type=1804 audit(1605832682.249:5139): pid=1611 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1266/bus" dev="sda1" ino=16383 res=1 errno=0 00:38:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00), 0x0, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:02 executing program 3: [ 1095.654982][ T1616] loop0: detected capacity change from 0 to 324608 [ 1095.751457][ T1616] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1095.841441][ T1616] EXT4-fs (loop0): get root inode failed [ 1095.847254][ T1616] EXT4-fs (loop0): mount failed 00:38:02 executing program 4: 00:38:02 executing program 2: 00:38:02 executing program 1: 00:38:02 executing program 3: 00:38:02 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00), 0x0, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:03 executing program 1: 00:38:03 executing program 2: 00:38:03 executing program 4: 00:38:03 executing program 3: 00:38:03 executing program 1: [ 1096.206159][ T1631] loop0: detected capacity change from 0 to 324608 00:38:03 executing program 3: [ 1096.287264][ T34] audit: type=1804 audit(1605832683.239:5140): pid=1638 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1267/bus" dev="sda1" ino=16347 res=1 errno=0 00:38:03 executing program 1: [ 1096.365275][ T1631] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated 00:38:03 executing program 2: 00:38:03 executing program 3: 00:38:03 executing program 4: [ 1096.505240][ T1631] EXT4-fs (loop0): get root inode failed [ 1096.553879][ T1631] EXT4-fs (loop0): mount failed 00:38:03 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:03 executing program 3: 00:38:03 executing program 1: 00:38:03 executing program 4: 00:38:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00), 0x0, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:03 executing program 2: 00:38:04 executing program 4: 00:38:04 executing program 1: 00:38:04 executing program 3: [ 1097.107976][ T1655] loop0: detected capacity change from 0 to 324608 00:38:04 executing program 2: [ 1097.214732][ T1655] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1097.229030][ T1655] EXT4-fs (loop0): get root inode failed [ 1097.242845][ T1655] EXT4-fs (loop0): mount failed 00:38:04 executing program 3: [ 1097.397598][ T34] audit: type=1804 audit(1605832684.349:5141): pid=1672 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1268/bus" dev="sda1" ino=16346 res=1 errno=0 00:38:04 executing program 2: 00:38:05 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:05 executing program 1: 00:38:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f465", 0xf, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:05 executing program 4: 00:38:05 executing program 2: 00:38:05 executing program 3: 00:38:05 executing program 4: 00:38:05 executing program 2: [ 1098.177938][ T1688] loop0: detected capacity change from 0 to 324608 00:38:05 executing program 3: [ 1098.267500][ T34] audit: type=1804 audit(1605832685.219:5142): pid=1691 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1269/bus" dev="sda1" ino=16353 res=1 errno=0 [ 1098.271076][ T1688] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1098.306125][ T1688] EXT4-fs (loop0): get root inode failed 00:38:05 executing program 1: [ 1098.314981][ T1688] EXT4-fs (loop0): mount failed 00:38:05 executing program 4: 00:38:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f465", 0xf, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:05 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:05 executing program 2: 00:38:05 executing program 3: 00:38:05 executing program 1: 00:38:05 executing program 4: 00:38:05 executing program 2: [ 1098.597858][ T1704] loop0: detected capacity change from 0 to 324608 [ 1098.664097][ T1704] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1098.760910][ T34] audit: type=1804 audit(1605832685.719:5143): pid=1715 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1270/bus" dev="sda1" ino=16343 res=1 errno=0 [ 1098.788640][ T1704] EXT4-fs (loop0): get root inode failed 00:38:05 executing program 4: 00:38:05 executing program 3: [ 1098.876736][ T1704] EXT4-fs (loop0): mount failed 00:38:05 executing program 1: 00:38:05 executing program 2: 00:38:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f465", 0xf, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:06 executing program 4: [ 1099.274337][ T1726] loop0: detected capacity change from 0 to 324608 [ 1099.321970][ T1726] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1099.342251][ T1726] EXT4-fs (loop0): get root inode failed [ 1099.348001][ T1726] EXT4-fs (loop0): mount failed 00:38:06 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:06 executing program 3: 00:38:06 executing program 1: 00:38:06 executing program 2: 00:38:06 executing program 4: 00:38:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:06 executing program 3: 00:38:06 executing program 2: 00:38:06 executing program 1: 00:38:06 executing program 4: [ 1099.586434][ T34] audit: type=1804 audit(1605832686.539:5144): pid=1738 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1271/bus" dev="sda1" ino=15770 res=1 errno=0 00:38:06 executing program 3: 00:38:06 executing program 4: [ 1099.724603][ T1744] loop0: detected capacity change from 0 to 324608 [ 1099.735214][ T34] audit: type=1804 audit(1605832686.639:5145): pid=1743 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1271/bus" dev="sda1" ino=15770 res=1 errno=0 [ 1099.843748][ T1744] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1099.884509][ T1744] EXT4-fs (loop0): get root inode failed [ 1099.905434][ T1744] EXT4-fs (loop0): mount failed 00:38:07 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:07 executing program 2: 00:38:07 executing program 1: 00:38:07 executing program 3: 00:38:07 executing program 4: 00:38:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1100.522546][ T1763] loop0: detected capacity change from 0 to 324608 00:38:07 executing program 2: 00:38:07 executing program 4: 00:38:07 executing program 1: 00:38:07 executing program 3: [ 1100.593698][ T1763] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1100.645101][ T1763] EXT4-fs (loop0): get root inode failed [ 1100.651648][ T1763] EXT4-fs (loop0): mount failed 00:38:07 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:07 executing program 2: 00:38:07 executing program 1: 00:38:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='$}\x00', r0) 00:38:07 executing program 3: [ 1100.920251][ T34] audit: type=1804 audit(1605832687.879:5146): pid=1778 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1273/bus" dev="sda1" ino=15970 res=1 errno=0 00:38:08 executing program 2: [ 1101.067988][ T1787] loop0: detected capacity change from 0 to 324608 [ 1101.101454][ T34] audit: type=1804 audit(1605832688.049:5147): pid=1786 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1273/bus" dev="sda1" ino=15970 res=1 errno=0 00:38:08 executing program 4: 00:38:08 executing program 1: [ 1101.188938][ T1787] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated 00:38:08 executing program 3: [ 1101.273238][ T1787] EXT4-fs (loop0): get root inode failed 00:38:08 executing program 1: [ 1101.328869][ T1787] EXT4-fs (loop0): mount failed 00:38:08 executing program 2: 00:38:08 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:38:08 executing program 3: 00:38:08 executing program 4: 00:38:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:08 executing program 1: 00:38:08 executing program 2: 00:38:08 executing program 4: 00:38:08 executing program 3: [ 1101.904617][ T1812] loop0: detected capacity change from 0 to 324608 00:38:08 executing program 1: 00:38:08 executing program 2: 00:38:09 executing program 3: [ 1102.007749][ T1812] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1102.042797][ T1812] EXT4-fs (loop0): get root inode failed [ 1102.088564][ T1812] EXT4-fs (loop0): mount failed 00:38:09 executing program 1: [ 1102.132864][ T34] audit: type=1804 audit(1605832689.089:5148): pid=1817 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1274/bus" dev="sda1" ino=15973 res=1 errno=0 00:38:09 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:38:09 executing program 4: 00:38:09 executing program 2: 00:38:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:09 executing program 3: 00:38:09 executing program 4: 00:38:09 executing program 3: 00:38:09 executing program 1: 00:38:09 executing program 2: [ 1102.495452][ T34] audit: type=1804 audit(1605832689.449:5149): pid=1833 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1275/bus" dev="sda1" ino=16306 res=1 errno=0 00:38:09 executing program 4: [ 1102.555203][ T1836] loop0: detected capacity change from 0 to 324608 00:38:09 executing program 2: 00:38:09 executing program 3: [ 1102.691920][ T1836] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1102.762839][ T1836] EXT4-fs (loop0): get root inode failed [ 1102.793054][ T1836] EXT4-fs (loop0): mount failed 00:38:10 executing program 4: 00:38:10 executing program 1: 00:38:10 executing program 3: 00:38:10 executing program 2: 00:38:10 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 00:38:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:10 executing program 1: [ 1103.410354][ T1858] loop0: detected capacity change from 0 to 324608 00:38:10 executing program 4: 00:38:10 executing program 3: 00:38:10 executing program 2: [ 1103.488906][ T1858] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1103.508192][ T1858] EXT4-fs (loop0): get root inode failed [ 1103.593854][ T1858] EXT4-fs (loop0): mount failed 00:38:10 executing program 1: 00:38:10 executing program 4: 00:38:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1103.742907][ T34] audit: type=1804 audit(1605832690.689:5150): pid=1869 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1276/bus" dev="sda1" ino=15974 res=1 errno=0 00:38:10 executing program 3: 00:38:10 executing program 2: 00:38:10 executing program 1: [ 1104.033808][ T1880] loop0: detected capacity change from 0 to 324608 [ 1104.085322][ T1880] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 1104.092428][ T1880] EXT4-fs (loop0): mount failed 00:38:11 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:11 executing program 4: 00:38:11 executing program 3: 00:38:11 executing program 2: 00:38:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:11 executing program 1: [ 1104.545872][ T1893] loop0: detected capacity change from 0 to 324608 [ 1104.684840][ T1893] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 1104.722433][ T1893] EXT4-fs (loop0): mount failed 00:38:11 executing program 3: 00:38:11 executing program 4: 00:38:11 executing program 1: [ 1104.727959][ T34] audit: type=1804 audit(1605832691.679:5151): pid=1900 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1277/bus" dev="sda1" ino=16344 res=1 errno=0 00:38:11 executing program 2: 00:38:11 executing program 1: 00:38:11 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 1104.962728][ T34] audit: type=1804 audit(1605832691.679:5152): pid=1898 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1277/bus" dev="sda1" ino=16344 res=1 errno=0 00:38:11 executing program 2: 00:38:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:12 executing program 4: 00:38:12 executing program 3: 00:38:12 executing program 1: [ 1105.143061][ T34] audit: type=1804 audit(1605832692.089:5153): pid=1908 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1278/bus" dev="sda1" ino=16344 res=1 errno=0 00:38:12 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 1105.209433][ T1913] loop0: detected capacity change from 0 to 324608 [ 1105.233593][ T1913] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 1105.240457][ T1913] EXT4-fs (loop0): mount failed 00:38:12 executing program 2: 00:38:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:12 executing program 4: 00:38:12 executing program 1: 00:38:12 executing program 3: [ 1105.435064][ T34] audit: type=1804 audit(1605832692.389:5154): pid=1923 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1279/bus" dev="sda1" ino=15974 res=1 errno=0 00:38:12 executing program 2: 00:38:12 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 1105.578409][ T1930] loop0: detected capacity change from 0 to 324608 00:38:12 executing program 1: 00:38:12 executing program 3: 00:38:12 executing program 4: [ 1105.700057][ T1930] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated 00:38:12 executing program 2: [ 1105.798035][ T1930] EXT4-fs (loop0): get root inode failed [ 1105.833384][ T1930] EXT4-fs (loop0): mount failed 00:38:12 executing program 3: [ 1105.886880][ T34] audit: type=1804 audit(1605832692.839:5155): pid=1942 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1280/bus" dev="sda1" ino=16383 res=1 errno=0 00:38:12 executing program 1: 00:38:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:13 executing program 4: 00:38:13 executing program 2: 00:38:13 executing program 1: 00:38:13 executing program 3: [ 1106.263144][ T1953] loop0: detected capacity change from 0 to 324608 [ 1106.341012][ T1953] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1106.392069][ T1953] EXT4-fs (loop0): get root inode failed [ 1106.405720][ T1953] EXT4-fs (loop0): mount failed 00:38:13 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:13 executing program 4: 00:38:13 executing program 2: 00:38:13 executing program 1: 00:38:13 executing program 3: 00:38:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:13 executing program 1: 00:38:13 executing program 2: 00:38:13 executing program 3: [ 1106.799737][ T1967] loop0: detected capacity change from 0 to 324608 [ 1106.894267][ T1967] EXT4-fs error (device loop0): ext4_fill_super:4958: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1106.933607][ T1967] EXT4-fs (loop0): get root inode failed [ 1106.946551][ T1967] EXT4-fs (loop0): mount failed 00:38:13 executing program 4: [ 1106.971988][ T34] audit: type=1804 audit(1605832693.929:5156): pid=1972 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1281/bus" dev="sda1" ino=16348 res=1 errno=0 00:38:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:14 executing program 3: [ 1107.264628][ T1982] loop0: detected capacity change from 0 to 324608 [ 1107.283034][ T1982] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1107.314674][ T1982] EXT4-fs (loop0): group descriptors corrupted! 00:38:14 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:14 executing program 2: 00:38:14 executing program 1: 00:38:14 executing program 4: 00:38:14 executing program 3: 00:38:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:14 executing program 3: 00:38:14 executing program 1: 00:38:14 executing program 2: [ 1107.820317][ T1994] loop0: detected capacity change from 0 to 324608 00:38:14 executing program 4: [ 1107.891633][ T1994] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 00:38:14 executing program 1: [ 1107.958407][ T1994] EXT4-fs (loop0): group descriptors corrupted! 00:38:15 executing program 2: [ 1108.177312][ T34] audit: type=1804 audit(1605832695.129:5157): pid=2005 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1282/bus" dev="sda1" ino=16383 res=1 errno=0 00:38:15 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:15 executing program 4: 00:38:15 executing program 3: 00:38:15 executing program 1: 00:38:15 executing program 2: 00:38:16 executing program 3: 00:38:16 executing program 1: [ 1109.135455][ T2019] loop0: detected capacity change from 0 to 324608 00:38:16 executing program 2: 00:38:16 executing program 4: [ 1109.241363][ T34] audit: type=1804 audit(1605832696.199:5158): pid=2023 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1283/bus" dev="sda1" ino=16345 res=1 errno=0 [ 1109.287692][ T2019] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1109.348966][ T2019] EXT4-fs (loop0): group descriptors corrupted! 00:38:16 executing program 1: 00:38:16 executing program 3: 00:38:17 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:17 executing program 2: 00:38:17 executing program 4: 00:38:17 executing program 1: 00:38:17 executing program 3: [ 1110.172629][ T2040] loop0: detected capacity change from 0 to 324608 [ 1110.222339][ T2040] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 00:38:17 executing program 2: 00:38:17 executing program 3: 00:38:17 executing program 4: 00:38:17 executing program 1: [ 1110.288046][ T2040] EXT4-fs (loop0): group descriptors corrupted! 00:38:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1110.424389][ T34] audit: type=1804 audit(1605832697.379:5159): pid=2049 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1284/bus" dev="sda1" ino=16350 res=1 errno=0 00:38:17 executing program 3: [ 1110.670717][ T2061] loop0: detected capacity change from 0 to 324608 [ 1110.698504][ T2061] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1110.716896][ T2061] EXT4-fs (loop0): group descriptors corrupted! 00:38:18 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:18 executing program 4: 00:38:18 executing program 1: 00:38:18 executing program 2: 00:38:18 executing program 3: 00:38:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:18 executing program 2: 00:38:18 executing program 3: 00:38:18 executing program 4: [ 1111.347792][ T2075] loop0: detected capacity change from 0 to 324608 [ 1111.368865][ T2075] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1111.380433][ T2075] EXT4-fs (loop0): group descriptors corrupted! 00:38:18 executing program 1: 00:38:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:18 executing program 2: [ 1111.623038][ T34] audit: type=1804 audit(1605832698.579:5160): pid=2084 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1285/bus" dev="sda1" ino=16195 res=1 errno=0 [ 1111.696985][ T2088] loop0: detected capacity change from 0 to 324608 [ 1111.754099][ T2088] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1111.797967][ T2088] EXT4-fs (loop0): group descriptors corrupted! 00:38:19 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:19 executing program 4: 00:38:19 executing program 3: 00:38:19 executing program 1: 00:38:19 executing program 2: 00:38:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:19 executing program 4: [ 1112.568233][ T2103] loop0: detected capacity change from 0 to 324608 00:38:19 executing program 3: [ 1112.608430][ T2103] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 00:38:19 executing program 2: 00:38:19 executing program 1: [ 1112.664357][ T2103] EXT4-fs (loop0): group descriptors corrupted! 00:38:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:19 executing program 4: [ 1113.005738][ T34] audit: type=1804 audit(1605832699.959:5161): pid=2114 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1286/bus" dev="sda1" ino=16359 res=1 errno=0 [ 1113.017976][ T2117] loop0: detected capacity change from 0 to 324608 [ 1113.099890][ T2117] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1113.135504][ T2117] EXT4-fs (loop0): group descriptors corrupted! 00:38:20 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:20 executing program 3: 00:38:20 executing program 2: 00:38:20 executing program 1: 00:38:20 executing program 4: 00:38:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e00000013", 0x5, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:20 executing program 2: 00:38:20 executing program 1: [ 1113.831656][ T2132] loop0: detected capacity change from 0 to 324608 00:38:20 executing program 4: 00:38:20 executing program 3: [ 1113.926419][ T2132] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! 00:38:20 executing program 3: [ 1113.991382][ T2132] EXT4-fs (loop0): group descriptors corrupted! 00:38:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e00000013", 0x5, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1114.131847][ T34] audit: type=1804 audit(1605832701.089:5162): pid=2143 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1287/bus" dev="sda1" ino=16384 res=1 errno=0 [ 1114.258354][ T2145] loop0: detected capacity change from 0 to 324608 [ 1114.341977][ T2145] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1114.410606][ T2145] EXT4-fs (loop0): group descriptors corrupted! 00:38:21 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:21 executing program 1: 00:38:21 executing program 4: 00:38:21 executing program 2: 00:38:21 executing program 3: 00:38:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e00000013", 0x5, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:21 executing program 4: [ 1115.008397][ T2158] loop0: detected capacity change from 0 to 324608 00:38:22 executing program 3: 00:38:22 executing program 2: [ 1115.076632][ T2158] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! 00:38:22 executing program 1: [ 1115.179501][ T2158] EXT4-fs (loop0): group descriptors corrupted! 00:38:22 executing program 3: 00:38:22 executing program 4: [ 1115.441108][ T34] audit: type=1804 audit(1605832702.389:5163): pid=2171 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1288/bus" dev="sda1" ino=16384 res=1 errno=0 00:38:23 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x0) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:23 executing program 1: 00:38:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e000000130000", 0x7, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:23 executing program 2: 00:38:23 executing program 3: 00:38:23 executing program 4: 00:38:23 executing program 2: 00:38:23 executing program 3: 00:38:23 executing program 1: [ 1116.244510][ T2181] loop0: detected capacity change from 0 to 324608 00:38:23 executing program 4: [ 1116.346249][ T2181] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! 00:38:23 executing program 2: [ 1116.453028][ T2181] EXT4-fs (loop0): group descriptors corrupted! [ 1116.480788][ T34] audit: type=1804 audit(1605832703.439:5164): pid=2185 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1289/bus" dev="sda1" ino=16355 res=1 errno=0 00:38:23 executing program 1: 00:38:24 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x0) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:24 executing program 3: 00:38:24 executing program 4: 00:38:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e000000130000", 0x7, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:24 executing program 2: 00:38:24 executing program 1: 00:38:24 executing program 4: 00:38:24 executing program 3: [ 1117.366602][ T2223] loop0: detected capacity change from 0 to 324608 [ 1117.400208][ T2223] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! 00:38:24 executing program 1: [ 1117.412882][ T2223] EXT4-fs (loop0): group descriptors corrupted! 00:38:24 executing program 2: 00:38:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e000000130000", 0x7, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1117.562592][ T34] audit: type=1804 audit(1605832704.519:5165): pid=2230 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1290/bus" dev="sda1" ino=16379 res=1 errno=0 00:38:24 executing program 1: [ 1117.746893][ T2236] loop0: detected capacity change from 0 to 324608 [ 1117.826172][ T2236] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1117.838231][ T2236] EXT4-fs (loop0): group descriptors corrupted! 00:38:25 executing program 4: 00:38:25 executing program 3: 00:38:25 executing program 2: 00:38:25 executing program 1: 00:38:25 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x0) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e00000013000000", 0x8, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:25 executing program 4: 00:38:25 executing program 2: 00:38:25 executing program 3: [ 1118.437888][ T2251] loop0: detected capacity change from 0 to 324608 [ 1118.459094][ T2251] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1118.469430][ T2251] EXT4-fs (loop0): group descriptors corrupted! 00:38:25 executing program 1: 00:38:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e00000013000000", 0x8, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1118.648269][ T34] audit: type=1804 audit(1605832705.599:5166): pid=2259 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1291/bus" dev="sda1" ino=16353 res=1 errno=0 00:38:25 executing program 2: 00:38:25 executing program 3: 00:38:25 executing program 4: 00:38:25 executing program 1: [ 1118.864268][ T2263] loop0: detected capacity change from 0 to 324608 [ 1118.936422][ T2263] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! 00:38:25 executing program 2: [ 1118.981086][ T2263] EXT4-fs (loop0): group descriptors corrupted! 00:38:26 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x0, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:26 executing program 4: 00:38:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e00000013000000", 0x8, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:26 executing program 3: 00:38:26 executing program 1: 00:38:26 executing program 2: 00:38:26 executing program 4: 00:38:26 executing program 1: 00:38:26 executing program 3: [ 1119.639900][ T2283] loop0: detected capacity change from 0 to 324608 [ 1119.705400][ T2283] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1119.733372][ T2283] EXT4-fs (loop0): group descriptors corrupted! 00:38:26 executing program 2: 00:38:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:26 executing program 4: [ 1119.999773][ T2295] loop0: detected capacity change from 0 to 324608 [ 1120.068306][ T2295] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1120.114644][ T2295] EXT4-fs (loop0): group descriptors corrupted! [ 1120.128555][ T34] audit: type=1804 audit(1605832707.079:5167): pid=2301 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1292/bus" dev="sda1" ino=16341 res=1 errno=0 00:38:27 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x0, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:27 executing program 3: 00:38:27 executing program 1: 00:38:27 executing program 4: 00:38:27 executing program 2: 00:38:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:27 executing program 2: 00:38:27 executing program 1: [ 1120.828000][ T2313] loop0: detected capacity change from 0 to 324608 00:38:27 executing program 4: 00:38:27 executing program 3: [ 1120.894122][ T2313] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 00:38:27 executing program 2: [ 1120.937684][ T2313] EXT4-fs (loop0): group descriptors corrupted! 00:38:27 executing program 3: [ 1121.261801][ T34] audit: type=1804 audit(1605832708.219:5168): pid=2325 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1293/bus" dev="sda1" ino=16085 res=1 errno=0 00:38:28 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x0, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:28 executing program 1: 00:38:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:28 executing program 4: 00:38:28 executing program 2: 00:38:28 executing program 3: 00:38:29 executing program 3: [ 1122.036566][ T2336] loop0: detected capacity change from 0 to 324608 00:38:29 executing program 2: 00:38:29 executing program 1: [ 1122.085044][ T2336] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1122.110079][ T2336] EXT4-fs (loop0): group descriptors corrupted! 00:38:29 executing program 3: 00:38:29 executing program 4: 00:38:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1122.471021][ T34] audit: type=1804 audit(1605832709.429:5169): pid=2350 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1294/bus" dev="sda1" ino=16360 res=1 errno=0 [ 1122.495553][ T2351] loop0: detected capacity change from 0 to 324608 [ 1122.537874][ T2351] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:30 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x0, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:30 executing program 2: 00:38:30 executing program 1: 00:38:30 executing program 3: 00:38:30 executing program 4: 00:38:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:30 executing program 1: 00:38:30 executing program 3: 00:38:30 executing program 2: 00:38:30 executing program 4: [ 1123.329057][ T2366] loop0: detected capacity change from 0 to 324608 00:38:30 executing program 1: [ 1123.403705][ T2366] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:30 executing program 3: [ 1123.542770][ T34] audit: type=1804 audit(1605832710.499:5170): pid=2379 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1295/bus" dev="sda1" ino=16359 res=1 errno=0 00:38:31 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x0, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x2, &(0x7f0000000300)=[{&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:31 executing program 2: 00:38:31 executing program 4: 00:38:31 executing program 1: 00:38:31 executing program 3: 00:38:31 executing program 1: [ 1124.354460][ T2392] loop0: detected capacity change from 0 to 324608 00:38:31 executing program 3: 00:38:31 executing program 4: 00:38:31 executing program 2: [ 1124.457653][ T2392] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:31 executing program 1: [ 1124.766240][ T2405] loop0: detected capacity change from 0 to 324608 [ 1124.802048][ T2405] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1124.837746][ T34] audit: type=1804 audit(1605832711.779:5171): pid=2410 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1296/bus" dev="sda1" ino=15755 res=1 errno=0 00:38:32 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x0, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:32 executing program 4: 00:38:32 executing program 2: 00:38:32 executing program 3: 00:38:32 executing program 1: 00:38:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:32 executing program 4: 00:38:32 executing program 3: [ 1125.616932][ T2425] loop0: detected capacity change from 0 to 324608 00:38:32 executing program 2: 00:38:32 executing program 1: [ 1125.704473][ T2425] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:32 executing program 3: 00:38:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1125.993385][ T34] audit: type=1804 audit(1605832712.949:5172): pid=2440 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1297/bus" dev="sda1" ino=16347 res=1 errno=0 [ 1126.063717][ T2441] loop0: detected capacity change from 0 to 324608 [ 1126.080691][ T2441] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:33 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:33 executing program 4: 00:38:33 executing program 1: 00:38:33 executing program 2: 00:38:33 executing program 3: 00:38:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:33 executing program 4: [ 1126.746708][ T2456] loop0: detected capacity change from 0 to 324608 [ 1126.767981][ T2456] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:33 executing program 2: 00:38:33 executing program 1: 00:38:33 executing program 3: 00:38:33 executing program 1: [ 1126.996820][ T2466] loop0: detected capacity change from 0 to 324608 [ 1127.088723][ T2466] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1127.160129][ T34] audit: type=1804 audit(1605832714.109:5173): pid=2472 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1298/bus" dev="sda1" ino=16383 res=1 errno=0 00:38:34 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:34 executing program 3: 00:38:34 executing program 2: 00:38:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080), 0x0, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:34 executing program 4: 00:38:34 executing program 1: 00:38:34 executing program 4: [ 1127.926362][ T2487] loop0: detected capacity change from 0 to 324608 00:38:34 executing program 3: 00:38:34 executing program 2: 00:38:35 executing program 1: [ 1128.042973][ T2487] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:35 executing program 1: 00:38:35 executing program 4: [ 1128.377526][ T34] audit: type=1804 audit(1605832715.329:5174): pid=2502 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1299/bus" dev="sda1" ino=16342 res=1 errno=0 00:38:35 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:35 executing program 2: 00:38:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:35 executing program 3: 00:38:35 executing program 4: 00:38:35 executing program 1: 00:38:36 executing program 2: 00:38:36 executing program 4: 00:38:36 executing program 1: 00:38:36 executing program 3: [ 1129.124058][ T2514] loop0: detected capacity change from 0 to 324608 00:38:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1129.199646][ T2514] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:36 executing program 3: [ 1129.445200][ T2525] loop0: detected capacity change from 0 to 324608 [ 1129.486647][ T2525] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1129.526470][ T34] audit: type=1804 audit(1605832716.479:5175): pid=2532 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1300/bus" dev="sda1" ino=16379 res=1 errno=0 00:38:37 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:37 executing program 4: 00:38:37 executing program 1: 00:38:37 executing program 2: 00:38:37 executing program 3: 00:38:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7", 0x2d, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:37 executing program 1: [ 1130.283645][ T2545] loop0: detected capacity change from 0 to 324608 00:38:37 executing program 3: 00:38:37 executing program 2: 00:38:37 executing program 4: [ 1130.364411][ T2545] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f465", 0x43, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:37 executing program 3: [ 1130.519277][ T34] audit: type=1804 audit(1605832717.469:5176): pid=2550 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1301/bus" dev="sda1" ino=15858 res=1 errno=0 [ 1130.683873][ T2558] loop0: detected capacity change from 0 to 324608 [ 1130.742770][ T2558] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:38 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:38 executing program 2: 00:38:38 executing program 4: 00:38:38 executing program 1: 00:38:38 executing program 3: 00:38:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f465", 0x43, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:38 executing program 1: 00:38:38 executing program 4: 00:38:38 executing program 2: [ 1131.304825][ T2575] loop0: detected capacity change from 0 to 324608 00:38:38 executing program 3: [ 1131.414658][ T2575] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:38 executing program 4: 00:38:38 executing program 1: [ 1131.796987][ T34] audit: type=1804 audit(1605832718.749:5177): pid=2592 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1302/bus" dev="sda1" ino=16275 res=1 errno=0 00:38:39 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:39 executing program 2: 00:38:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f465", 0x43, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:39 executing program 3: 00:38:39 executing program 4: 00:38:39 executing program 1: 00:38:39 executing program 2: [ 1132.608378][ T2602] loop0: detected capacity change from 0 to 324608 00:38:39 executing program 4: 00:38:39 executing program 3: 00:38:39 executing program 1: [ 1132.674353][ T2602] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:39 executing program 3: 00:38:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000010000000100", 0x4e, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1132.973382][ T34] audit: type=1804 audit(1605832719.929:5178): pid=2616 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1303/bus" dev="sda1" ino=15796 res=1 errno=0 [ 1133.064624][ T2618] loop0: detected capacity change from 0 to 324608 [ 1133.093948][ T2618] EXT4-fs (loop0): invalid first ino: 0 00:38:40 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, 0x0, 0x0) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:40 executing program 2: 00:38:40 executing program 4: 00:38:40 executing program 1: 00:38:40 executing program 3: 00:38:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000010000000100", 0x4e, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:40 executing program 2: 00:38:40 executing program 4: [ 1133.844967][ T2632] loop0: detected capacity change from 0 to 324608 00:38:40 executing program 1: 00:38:40 executing program 3: [ 1133.912900][ T2632] EXT4-fs (loop0): invalid first ino: 0 00:38:41 executing program 2: 00:38:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000010000000100", 0x4e, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1134.223591][ T34] audit: type=1804 audit(1605832721.179:5179): pid=2647 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1304/bus" dev="sda1" ino=15969 res=1 errno=0 [ 1134.309458][ T2648] loop0: detected capacity change from 0 to 324608 [ 1134.324994][ T2648] EXT4-fs (loop0): invalid first ino: 0 00:38:41 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, 0x0, 0x0) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:41 executing program 4: 00:38:41 executing program 1: 00:38:41 executing program 3: 00:38:41 executing program 2: 00:38:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000010000000100000264370000", 0x54, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:42 executing program 4: 00:38:42 executing program 3: 00:38:42 executing program 1: [ 1135.016885][ T2663] loop0: detected capacity change from 0 to 324608 00:38:42 executing program 2: [ 1135.068332][ T2663] EXT4-fs (loop0): invalid first ino: 0 00:38:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000010000000100000264370000", 0x54, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:42 executing program 3: [ 1135.413834][ T2679] loop0: detected capacity change from 0 to 324608 [ 1135.523316][ T34] audit: type=1804 audit(1605832722.469:5180): pid=2681 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1305/bus" dev="sda1" ino=15760 res=1 errno=0 [ 1135.552980][ T2679] EXT4-fs (loop0): invalid first ino: 0 00:38:43 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, 0x0, 0x0) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:43 executing program 2: 00:38:43 executing program 4: 00:38:43 executing program 1: 00:38:43 executing program 3: 00:38:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000000010000000100000264370000", 0x54, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:43 executing program 4: 00:38:43 executing program 1: [ 1136.251386][ T2697] loop0: detected capacity change from 0 to 324608 00:38:43 executing program 2: 00:38:43 executing program 3: [ 1136.346616][ T2697] EXT4-fs (loop0): invalid first ino: 0 00:38:43 executing program 1: 00:38:43 executing program 3: [ 1136.621678][ T34] audit: type=1804 audit(1605832723.579:5181): pid=2708 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1306/bus" dev="sda1" ino=16383 res=1 errno=0 00:38:44 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b0000", 0x57, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:44 executing program 4: 00:38:44 executing program 2: 00:38:44 executing program 1: 00:38:44 executing program 3: 00:38:44 executing program 2: [ 1137.339308][ T2725] loop0: detected capacity change from 0 to 324608 [ 1137.387023][ T2725] EXT4-fs (loop0): unsupported inode size: 0 [ 1137.399253][ T2725] EXT4-fs (loop0): blocksize: 1024 00:38:44 executing program 1: 00:38:44 executing program 4: 00:38:44 executing program 3: 00:38:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b0000", 0x57, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:44 executing program 2: [ 1137.749581][ T2740] loop0: detected capacity change from 0 to 324608 [ 1137.798769][ T2740] EXT4-fs (loop0): unsupported inode size: 0 [ 1137.813157][ T2740] EXT4-fs (loop0): blocksize: 1024 [ 1137.925525][ T34] audit: type=1804 audit(1605832724.879:5182): pid=2744 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1307/bus" dev="sda1" ino=16342 res=1 errno=0 00:38:45 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:45 executing program 1: 00:38:45 executing program 3: 00:38:45 executing program 4: 00:38:45 executing program 2: 00:38:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b0000", 0x57, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:45 executing program 4: 00:38:45 executing program 3: 00:38:45 executing program 2: 00:38:45 executing program 1: [ 1138.710398][ T2759] loop0: detected capacity change from 0 to 324608 [ 1138.767699][ T2759] EXT4-fs (loop0): unsupported inode size: 0 00:38:45 executing program 4: [ 1138.810201][ T2759] EXT4-fs (loop0): blocksize: 1024 00:38:45 executing program 1: [ 1139.046668][ T34] audit: type=1804 audit(1605832725.999:5183): pid=2774 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1308/bus" dev="sda1" ino=16350 res=1 errno=0 00:38:46 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:46 executing program 3: 00:38:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b000000", 0x58, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:46 executing program 2: 00:38:46 executing program 4: 00:38:46 executing program 1: 00:38:46 executing program 3: 00:38:46 executing program 1: 00:38:46 executing program 4: 00:38:46 executing program 2: [ 1139.851117][ T2787] loop0: detected capacity change from 0 to 324608 [ 1139.931723][ T2787] EXT4-fs (loop0): unsupported inode size: 0 [ 1139.994096][ T2787] EXT4-fs (loop0): blocksize: 1024 00:38:47 executing program 1: 00:38:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b000000", 0x58, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1140.268377][ T2803] loop0: detected capacity change from 0 to 324608 [ 1140.328418][ T34] audit: type=1804 audit(1605832727.279:5184): pid=2805 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1309/bus" dev="sda1" ino=16345 res=1 errno=0 [ 1140.329044][ T2803] EXT4-fs (loop0): unsupported inode size: 0 [ 1140.453528][ T2803] EXT4-fs (loop0): blocksize: 1024 00:38:48 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(0xffffffffffffffff) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:48 executing program 3: 00:38:48 executing program 4: 00:38:48 executing program 1: 00:38:48 executing program 2: 00:38:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b000000", 0x58, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:48 executing program 4: [ 1141.126194][ T2820] loop0: detected capacity change from 0 to 324608 00:38:48 executing program 3: 00:38:48 executing program 1: [ 1141.193558][ T2820] EXT4-fs (loop0): unsupported inode size: 0 00:38:48 executing program 2: [ 1141.255658][ T2820] EXT4-fs (loop0): blocksize: 1024 00:38:48 executing program 3: 00:38:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) [ 1141.576733][ T2836] loop0: detected capacity change from 0 to 324608 [ 1141.608599][ T2836] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1141.648378][ T34] audit: type=1804 audit(1605832728.599:5185): pid=2835 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1310/bus" dev="sda1" ino=15969 res=1 errno=0 00:38:49 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(0xffffffffffffffff) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:49 executing program 4: 00:38:49 executing program 2: 00:38:49 executing program 1: 00:38:49 executing program 3: 00:38:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:49 executing program 1: 00:38:49 executing program 4: 00:38:49 executing program 2: 00:38:49 executing program 3: [ 1142.392935][ T2853] loop0: detected capacity change from 0 to 324608 [ 1142.469363][ T2853] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae85"]) 00:38:49 executing program 1: [ 1142.666463][ T34] audit: type=1804 audit(1605832729.619:5186): pid=2864 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1311/bus" dev="sda1" ino=16358 res=1 errno=0 [ 1142.775283][ T2869] loop0: detected capacity change from 0 to 324608 [ 1142.806898][ T2869] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 00:38:50 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(0xffffffffffffffff) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:50 executing program 4: 00:38:50 executing program 3: 00:38:50 executing program 2: 00:38:50 executing program 1: 00:38:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, 0x0) 00:38:50 executing program 2: [ 1143.464415][ T2887] loop0: detected capacity change from 0 to 324608 00:38:50 executing program 1: 00:38:50 executing program 3: 00:38:50 executing program 4: 00:38:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, 0x0) 00:38:50 executing program 1: [ 1143.807422][ T2899] loop0: detected capacity change from 0 to 324608 [ 1143.853292][ T34] audit: type=1804 audit(1605832730.809:5187): pid=2902 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1312/bus" dev="sda1" ino=16344 res=1 errno=0 00:38:51 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(0x0, 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:51 executing program 3: 00:38:51 executing program 2: 00:38:51 executing program 4: 00:38:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, 0x0) 00:38:51 executing program 1: 00:38:51 executing program 4: [ 1144.708683][ T2917] loop0: detected capacity change from 0 to 324608 00:38:51 executing program 3: 00:38:51 executing program 2: 00:38:51 executing program 1: 00:38:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[]) 00:38:51 executing program 3: [ 1145.090326][ T2930] loop0: detected capacity change from 0 to 324608 [ 1145.131763][ T2930] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1145.180883][ T2930] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:52 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(0x0, 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:52 executing program 4: 00:38:52 executing program 2: 00:38:52 executing program 1: 00:38:52 executing program 3: 00:38:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[]) 00:38:52 executing program 3: 00:38:52 executing program 2: 00:38:53 executing program 1: 00:38:53 executing program 4: [ 1145.979978][ T2947] loop0: detected capacity change from 0 to 324608 [ 1146.064904][ T2947] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1146.104868][ T2947] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[]) 00:38:53 executing program 1: [ 1146.407279][ T2961] loop0: detected capacity change from 0 to 324608 [ 1146.515552][ T2961] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1146.538756][ T2961] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:54 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(0x0, 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 00:38:54 executing program 4: 00:38:54 executing program 2: 00:38:54 executing program 3: 00:38:54 executing program 1: 00:38:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 00:38:54 executing program 4: 00:38:54 executing program 1: 00:38:54 executing program 2: [ 1147.153999][ T2977] loop0: detected capacity change from 0 to 324608 00:38:54 executing program 3: [ 1147.241070][ T2977] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1147.279007][ T2977] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 00:38:54 executing program 1: [ 1147.620950][ T2995] loop0: detected capacity change from 0 to 324608 [ 1147.690730][ T2995] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1147.700984][ T2995] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:55 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) dup(r3) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 00:38:55 executing program 4: 00:38:55 executing program 2: 00:38:55 executing program 1: 00:38:55 executing program 3: 00:38:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 00:38:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @empty}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000940)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d802000000000000f0000000f000000000000000f000000040020000400200004002000040020000400200000400000000000000000000000000000000000000000000000000000000000000000000000000de00000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff00020000000000000000000000000000c800f000000000000011596b0599e061800000000000004030006164647274797065000000000000000000000000000000000000000000000000000000000000000000000000000028006164647274797065000000000000000000000000000000000000000000010001000909000000280052454a454354000000000000000000000000000000000000000000000000000000000000c51546bb00000000000000000000000000000000000000000000000000000000e400000000000000000000000000000000faffffff00000000000000000000000e00000000090049000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b80000000000000000000000000000000000000000004800544545000000000000000000000000000000000000000000000000000001ac1414bb00000000000000000000000076657468305f746f5f627269646765000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendmmsg(r0, &(0x7f0000000040), 0x63, 0x0) 00:38:55 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') [ 1148.413357][ T3014] loop0: detected capacity change from 0 to 324608 [ 1148.472675][ T3014] EXT4-fs (loop0): revision level too high, forcing read-only mode 00:38:55 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000140)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0x0) 00:38:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'ip6_vti0\x00', 0x0}) [ 1148.517113][ T3014] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:55 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000440)='ns/time\x00') [ 1148.565125][ T3024] x_tables: duplicate underflow at hook 2 [ 1148.591744][ T3024] x_tables: duplicate underflow at hook 2 00:38:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d"]) [ 1148.720640][ T34] audit: type=1804 audit(1605832735.679:5188): pid=3031 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1316/bus" dev="sda1" ino=16360 res=1 errno=0 [ 1148.938146][ T3041] loop0: detected capacity change from 0 to 324608 [ 1148.967211][ T3041] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1148.978743][ T3041] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:56 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) dup(r3) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 00:38:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$apparmor_current(r0, 0x0, 0xe) 00:38:56 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sockstat6\x00') 00:38:56 executing program 3: pselect6(0x40, &(0x7f0000000200), 0x0, &(0x7f0000000280)={0x8}, 0x0, &(0x7f0000000340)={0x0}) 00:38:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/rt_cache\x00') write$P9_RFLUSH(r0, 0x0, 0x0) 00:38:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d"]) 00:38:56 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_STATFS(r0, 0x0, 0x0) [ 1149.580913][ T3064] loop0: detected capacity change from 0 to 324608 00:38:56 executing program 3: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000003040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 00:38:56 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') 00:38:56 executing program 1: pipe2$9p(&(0x7f0000000280), 0x0) [ 1149.677902][ T3064] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1149.745167][ T3064] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d"]) 00:38:56 executing program 2: sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000640)=""/142) [ 1150.012580][ T34] audit: type=1804 audit(1605832736.949:5189): pid=3088 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1317/bus" dev="sda1" ino=16359 res=1 errno=0 [ 1150.067668][ T3090] loop0: detected capacity change from 0 to 324608 [ 1150.124141][ T3090] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1150.147413][ T3090] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:57 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) dup(r3) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 00:38:57 executing program 3: perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:38:57 executing program 1: syz_open_dev$loop(&(0x7f0000003040)='/dev/loop#\x00', 0x0, 0x80) 00:38:57 executing program 4: getgroups(0x1, &(0x7f0000000540)=[0xee00]) 00:38:57 executing program 2: name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1400) 00:38:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6e"]) 00:38:57 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x222000, 0x0) [ 1150.717595][ T3113] loop0: detected capacity change from 0 to 324608 00:38:57 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/icmp6\x00') 00:38:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)={0xec4, 0x0, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x918, 0x8, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}]}, {0x4}, {0x70, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec350cac9c598a0e8749ab7648476f8e0da1e56fecdffbc73df06688b3e4a21"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "9b0e2aa14c606fb07532962251d6edb8062a3967b17d9b48e590955a874bf587"}]}, {0x12c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xa8, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "56b3476d20ab884055bb3f260f2d0402e10b1dc9b28733220f8dcb389dabe846"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "637e4678fb0b3200f67a319209e277ab1beba629aa4836a672f13473b82b3bf1"}]}, {0x554, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local, 0x10001}}, @WGPEER_A_ALLOWEDIPS={0x154, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x1d4, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @dev}}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x1dc, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8}]}, {0x5c, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @dev}}]}, {0x1a0, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @broadcast}}, @WGPEER_A_ALLOWEDIPS={0x138, 0x9, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "2eee253e74f4ee51cab6b3f35ad7a130cd8001c7c711d70d91d42210f58511be"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "9bf2a406fef2904bfc49896685a465429bae69cdd67edf8de0a97b358a3404b0"}, @WGPEER_A_FLAGS={0x8}]}]}, @WGDEVICE_A_PEERS={0x574, 0x8, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "5c2f87770833469ef90ef35548e7969fea5c9aa7ce0302bec69b64fc2f146d85"}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @broadcast}}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "5cc16bdeff5eb3030f298ffa86a2d21c77da2fb6782308673981f443f5b939dd"}]}, {0x4d4, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x200, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x29c, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @broadcast}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @multicast1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}]}]}]}]}, 0xec4}}, 0x0) 00:38:57 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x101440, 0x0) [ 1150.890031][ T3113] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1150.944773][ T3113] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x20004040) 00:38:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6e"]) [ 1151.151989][ T34] audit: type=1804 audit(1605832738.109:5190): pid=3132 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1318/bus" dev="sda1" ino=16383 res=1 errno=0 [ 1151.345760][ T3139] loop0: detected capacity change from 0 to 324608 [ 1151.392462][ T3139] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1151.415807][ T3139] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:58 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 00:38:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 00:38:58 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/tcp\x00') 00:38:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_stats={0x1d, 0x2, [0x0, 0x80000001]}}) 00:38:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 00:38:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6e"]) 00:38:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r0, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x318, 0x140, 0x1e8, 0x1e8, 0x1e8, 0x140, 0x280, 0x280, 0x280, 0x280, 0x280, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @broadcast, @local}}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x1}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x9, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @icmp_id, @gre_key}}}}, {{@ip={@multicast1, @empty, 0x0, 0x0, 'ip6gre0\x00', 'veth1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) syz_emit_ethernet(0x6a, &(0x7f0000000580)={@local, @dev, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @rand_addr, {[@timestamp_addr={0x44, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x8864}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}}}}}}, 0x0) 00:38:58 executing program 4: open$dir(0x0, 0x101000, 0x0) [ 1151.921695][ T3156] loop0: detected capacity change from 0 to 324608 00:38:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 00:38:59 executing program 2: pselect6(0x40, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) [ 1152.092181][ T3156] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1152.130360][ T3168] x_tables: duplicate underflow at hook 1 [ 1152.143685][ T3156] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:38:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x404}, 0x14}}, 0x0) [ 1152.188907][ T3174] x_tables: duplicate underflow at hook 1 00:38:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000840)='stack\x00') fchownat(r0, &(0x7f0000000880)='./file0\x00', 0x0, 0xee00, 0x0) [ 1152.303119][ T34] audit: type=1804 audit(1605832739.259:5191): pid=3173 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1319/bus" dev="sda1" ino=16360 res=1 errno=0 00:38:59 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 00:38:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e"]) 00:38:59 executing program 3: futimesat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{0x0, 0xea60}, {0x0, 0xea60}}) 00:38:59 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:38:59 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nf_conntrack_expect\x00') perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0x5}, 0x0, 0x0, r0, 0x0) 00:39:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') [ 1153.046888][ T3192] loop0: detected capacity change from 0 to 324608 00:39:00 executing program 4: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) 00:39:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e"]) [ 1153.111510][ T3192] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1153.140986][ T3192] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:00 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7}, 0x7) 00:39:00 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001780)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:39:00 executing program 4: shmget$private(0x0, 0x2000, 0xbcf514a1eb8fcac0, &(0x7f0000ffd000/0x2000)=nil) 00:39:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000200)="89", 0x1}], 0x2}, 0x0) [ 1153.412590][ T3213] loop0: detected capacity change from 0 to 324608 [ 1153.488194][ T34] audit: type=1804 audit(1605832740.439:5192): pid=3220 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1320/bus" dev="sda1" ino=16355 res=1 errno=0 [ 1153.568100][ T3213] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1153.651777][ T3213] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:01 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 00:39:01 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/raw6\x00') 00:39:01 executing program 4: pselect6(0x40, &(0x7f0000000200)={0x6, 0x6}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xda9f}, &(0x7f0000000280)={0x8, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f00000002c0)={0x0, 0x3938700}, &(0x7f0000000340)={&(0x7f0000000300)={[0x3ff]}, 0x8}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 00:39:01 executing program 2: perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) 00:39:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:39:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e"]) [ 1154.335509][ T3243] loop0: detected capacity change from 0 to 324608 00:39:01 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) 00:39:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f0000000080)={'ip_vti0\x00', @ifru_addrs=@nfc}}) 00:39:01 executing program 3: [ 1154.427051][ T3243] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1154.445067][ T3243] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:01 executing program 1: 00:39:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd"]) 00:39:01 executing program 3: [ 1154.643002][ T34] audit: type=1804 audit(1605832741.599:5193): pid=3257 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1321/bus" dev="sda1" ino=16347 res=1 errno=0 [ 1154.909521][ T3268] loop0: detected capacity change from 0 to 324608 [ 1154.970015][ T3268] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1154.998279][ T3268] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:02 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) 00:39:02 executing program 4: 00:39:02 executing program 1: 00:39:02 executing program 2: 00:39:02 executing program 3: 00:39:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd"]) 00:39:02 executing program 3: 00:39:02 executing program 2: 00:39:02 executing program 4: [ 1155.537964][ T3282] loop0: detected capacity change from 0 to 324608 00:39:02 executing program 1: 00:39:02 executing program 3: 00:39:02 executing program 4: [ 1155.699840][ T3282] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1155.708984][ T3282] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1155.926304][ T34] audit: type=1804 audit(1605832742.879:5194): pid=3295 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1322/bus" dev="sda1" ino=16344 res=1 errno=0 00:39:03 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) 00:39:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd"]) 00:39:03 executing program 1: 00:39:03 executing program 2: 00:39:03 executing program 3: 00:39:03 executing program 4: 00:39:03 executing program 2: 00:39:03 executing program 1: 00:39:03 executing program 4: 00:39:03 executing program 3: [ 1156.671968][ T3310] loop0: detected capacity change from 0 to 324608 [ 1156.765808][ T3310] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1156.794968][ T3310] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a"]) 00:39:03 executing program 2: [ 1157.080433][ T34] audit: type=1804 audit(1605832744.039:5195): pid=3323 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1323/bus" dev="sda1" ino=16341 res=1 errno=0 [ 1157.157609][ T3329] loop0: detected capacity change from 0 to 324608 [ 1157.264514][ T3329] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1157.306397][ T3329] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:04 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1f) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket(0x2, 0x803, 0xff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockname$llc(0xffffffffffffffff, 0x0, 0x0) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) 00:39:04 executing program 1: 00:39:04 executing program 4: 00:39:04 executing program 3: 00:39:04 executing program 2: 00:39:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a"]) 00:39:04 executing program 2: 00:39:04 executing program 1: [ 1157.950837][ T3348] loop0: detected capacity change from 0 to 324608 00:39:05 executing program 4: 00:39:05 executing program 3: [ 1158.061348][ T3348] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1158.092188][ T3348] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a"]) 00:39:05 executing program 4: [ 1158.370364][ T34] audit: type=1804 audit(1605832745.329:5196): pid=3361 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir834391291/syzkaller.ize52h/1324/bus" dev="sda1" ino=16360 res=1 errno=0 [ 1158.477213][ T3366] loop0: detected capacity change from 0 to 324608 [ 1158.544800][ T3366] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1158.577413][ T3366] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:05 executing program 1: 00:39:05 executing program 2: 00:39:05 executing program 3: 00:39:05 executing program 4: 00:39:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae"]) 00:39:06 executing program 5: 00:39:06 executing program 1: 00:39:06 executing program 4: 00:39:06 executing program 3: 00:39:06 executing program 2: [ 1159.086304][ T3383] loop0: detected capacity change from 0 to 324608 00:39:06 executing program 5: [ 1159.242270][ T3383] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1159.312354][ T3383] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:06 executing program 2: 00:39:06 executing program 4: 00:39:06 executing program 1: 00:39:06 executing program 3: 00:39:06 executing program 2: 00:39:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae"]) 00:39:06 executing program 5: 00:39:06 executing program 4: 00:39:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x86}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r1, 0x1) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setreuid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{0x0, 0x0, 0x0}], 0x1, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x24000010) dup2(r3, r2) 00:39:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x40) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0xf, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:39:06 executing program 4: r0 = epoll_create(0x3) write$binfmt_aout(r0, 0x0, 0x0) 00:39:06 executing program 5: syz_mount_image$romfs(&(0x7f0000000040)='romfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x100d, &(0x7f0000000340)) 00:39:06 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x80) symlink(0x0, &(0x7f0000000180)='./file0\x00') mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x800) lseek(r1, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001440)=ANY=[@ANYBLOB="02a503241039a708154343ef42b23317217023cee7dabe6578f502bcedd88cbd0c6c21bbc58d354f28cd51b6275e85afd3ac00bdf56eca07a1f36b30570bdf8e6b810c539e26f0adf6c7eea7b1f5442ecb8c45d1c7933b6dc628c6c55af04a7cfbed6d81f05c28351dab3c77ccbfec1e75d02adab568d3d8ddbd9212b180501ff1f4c07d04c7bf650755dbd08047ea0c0219fdb07e7761f216bfb268735a76472f3d4f24671f608bee5ae8cd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf250200000008000600ac"], 0x30}, 0x1, 0x0, 0x0, 0x2400c8d0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) io_submit(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, 0x0, 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000200)={0x40}) ioctl$CHAR_RAW_GETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) [ 1159.770749][ T3407] loop0: detected capacity change from 0 to 324608 [ 1159.855139][ T3407] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1159.867601][ T3407] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 00:39:06 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x8c, &(0x7f00000001c0)=""/140, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:39:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000280)={0x2, 'virt_wifi0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f478, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000002643700000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="000bdf93faca9ccb19b59c452868fc8eb13973e4fc61f16c12a740fa04f92ef7495a7af610f49f63e67297313f25ab26ac1d53ddc84c5194c214bfa888500b6b778c1da56e7d9822dafc6ea9c32a97119063f3015cda999e0590fa57a4bd54355a64ae"]) 00:39:07 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002000)='ns/net\x00') signalfd(r0, &(0x7f0000000080), 0x8) 00:39:07 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000002000)='ns/ipc\x00') [ 1160.107610][ T34] audit: type=1804 audit(1605832747.059:5197): pid=3420 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir096481368/syzkaller.YF8KRA/1454/file0" dev="sda1" ino=15744 res=1 errno=0 00:39:07 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') 00:39:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454cb, &(0x7f0000000000)) 00:39:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000000}) 00:39:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000180), 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x10000, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000240)={0x7, 0x79, 0x1}, 0x7) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000001400)="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"/3584, 0xe00) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x4, 0x3d, "d031b4a252850b6ac5d864f9f2c2ffec"}, 0x15, 0x1) fallocate(r1, 0x11, 0x0, 0x10000) r3 = dup(0xffffffffffffffff) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000000)=0x751ace8) sendfile(r1, r2, 0x0, 0x11f08) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x81]}, 0x8, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) 00:39:07 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self\x00', 0x0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self\x00', 0x0, 0x0) dup3(r0, r1, 0x0) [ 1160.278099][ T3440] loop0: detected capacity change from 0 to 324608 [ 1160.399315][ T3440] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 1160.468933][ T3440] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1160.595334][ T34] audit: type=1800 audit(1605832747.549:5198): pid=3460 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15989 res=0 errno=0 00:39:07 executing program 3: r0 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff8000/0x8000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/32) 00:39:07 executing program 5: write$binfmt_script(0xffffffffffffffff, 0x0, 0x80) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x40) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001440)=ANY=[@ANYBLOB], 0x30}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) io_submit(0x0, 0x3, &(0x7f0000001840)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000001540)="97f5d926394654db37212b336e94c454016cdf181ba2ecd409b48b4d1c029663c641460b5524c2ec26cdbd06fa0eb09f4c2643176b27cacec82ce94dedfe9c0f1c4e534e06259f5bf2d9da43a609948893b2dc119188fa0f7525571b8257b21b4b7b696470cfdd6efd09b3bb3499925905cae5c374174a36c2e8552ba6adc969bfe1180d9a5c9fa9d628eaf22067759bc2d04006bce232179b06351f69b082aa0f062f402e97b4dc4f087de1aaae38635bbe96e1591b170a5a326bdefd26594947530917f803f3483104e7be57330990ec81c9299a51d234", 0xd8, 0x0, 0x0, 0x3}, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x2, 0x3ff, r1, &(0x7f0000001280)="979eb5b7b618f2aed6f9d92440931eb4622c6e24c9aeb71260438f4a9b", 0x1d}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x3f, 0xffffffffffffffff, &(0x7f0000001640)="4c048168daa99997d1a01861c0934d3cd01cfbac72eb834a7dcfea98", 0x1c, 0x9, 0x0, 0x3}]) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$CHAR_RAW_GETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) 00:39:07 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe051}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000300), 0x4) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x3) socket$inet_icmp(0x2, 0x2, 0x1) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a203000000000000008b5e1a2e21da765cd1ce2356a8"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') 00:39:07 executing program 2: io_setup(0x10001, &(0x7f0000000080)) 00:39:07 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002000)='ns/net\x00') ioctl$int_out(r0, 0x40049409, &(0x7f0000004080)) [ 1160.736694][ T3445] IPVS: ftp: loaded support on port[0] = 21 00:39:07 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self\x00', 0x2040, 0x0) 00:39:08 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe051}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000300), 0x4) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x3) socket$inet_icmp(0x2, 0x2, 0x1) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a203000000000000008b5e1a2e21da765cd1ce2356a8"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') 00:39:08 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe051}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000300), 0x4) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x3) socket$inet_icmp(0x2, 0x2, 0x1) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a203000000000000008b5e1a2e21da765cd1ce2356a8"], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') 00:39:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8901, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) [ 1161.042158][ T3481] ptrace attach of "/root/syz-executor.4"[3477] was attempted by "/root/syz-executor.4"[3481] 00:39:08 executing program 3: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000010c0)=[{&(0x7f00000000c0)="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", 0x1000, 0xe000000000000000}], 0x0, 0x0) [ 1161.358131][ T3453] IPVS: ftp: loaded support on port[0] = 21 [ 1161.428770][ T3503] ptrace attach of "/root/syz-executor.2"[3494] was attempted by "/root/syz-executor.2"[3503] [ 1161.531548][ T3509] ptrace attach of "/root/syz-executor.4"[3502] was attempted by "/root/syz-executor.4"[3509] [ 1161.606521][ T3525] loop3: detected capacity change from 0 to 135266304 [ 1161.730240][ T3525] loop3: detected capacity change from 0 to 135266304 00:39:11 executing program 0: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f0000000280)="af0a9d9483da72fa6ff6", 0xa, 0xfffffffffffffff7}], 0x0, 0x0) 00:39:11 executing program 5: write$binfmt_script(0xffffffffffffffff, 0x0, 0x80) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x40) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001440)=ANY=[@ANYBLOB], 0x30}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) io_submit(0x0, 0x3, &(0x7f0000001840)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000001540)="97f5d926394654db37212b336e94c454016cdf181ba2ecd409b48b4d1c029663c641460b5524c2ec26cdbd06fa0eb09f4c2643176b27cacec82ce94dedfe9c0f1c4e534e06259f5bf2d9da43a609948893b2dc119188fa0f7525571b8257b21b4b7b696470cfdd6efd09b3bb3499925905cae5c374174a36c2e8552ba6adc969bfe1180d9a5c9fa9d628eaf22067759bc2d04006bce232179b06351f69b082aa0f062f402e97b4dc4f087de1aaae38635bbe96e1591b170a5a326bdefd26594947530917f803f3483104e7be57330990ec81c9299a51d234", 0xd8, 0x0, 0x0, 0x3}, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x2, 0x3ff, r1, &(0x7f0000001280)="979eb5b7b618f2aed6f9d92440931eb4622c6e24c9aeb71260438f4a9b", 0x1d}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x3f, 0xffffffffffffffff, &(0x7f0000001640)="4c048168daa99997d1a01861c0934d3cd01cfbac72eb834a7dcfea98", 0x1c, 0x9, 0x0, 0x3}]) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$CHAR_RAW_GETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) 00:39:11 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) 00:39:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x80cb0100, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/132, 0x18, 0x84, 0x8}, 0x20) 00:39:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000180), 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x10000, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000240)={0x7, 0x79, 0x1}, 0x7) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000001400)="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"/3584, 0xe00) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x4, 0x3d, "d031b4a252850b6ac5d864f9f2c2ffec"}, 0x15, 0x1) fallocate(r1, 0x11, 0x0, 0x10000) r3 = dup(0xffffffffffffffff) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000000)=0x751ace8) sendfile(r1, r2, 0x0, 0x11f08) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x81]}, 0x8, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) 00:39:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f00000000c0), 0xc) [ 1165.103374][ T3579] BPF:No data [ 1165.127074][ T3581] loop0: detected capacity change from 0 to 8388096 00:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000180), 0x8) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x10000, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000240)={0x7, 0x79, 0x1}, 0x7) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000001400)="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"/3584, 0xe00) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x4, 0x3d, "d031b4a252850b6ac5d864f9f2c2ffec"}, 0x15, 0x1) fallocate(r1, 0x11, 0x0, 0x10000) r3 = dup(0xffffffffffffffff) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000000)=0x751ace8) sendfile(r1, r2, 0x0, 0x11f08) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x81]}, 0x8, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) 00:39:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETVNETHDRSZ(r0, 0x54e3, 0x0) 00:39:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xf, 0x0, 0x0, 0x80000000, 0x0, 0x1}, 0x40) 00:39:12 executing program 0: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r1, 0x1) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setreuid(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, 0x0, 0x24000010) dup2(r3, r2) 00:39:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8923, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:39:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(r0, 0x40049409, r1) [ 1165.775033][ T34] audit: type=1800 audit(1605832752.709:5199): pid=3594 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16307 res=0 errno=0 00:39:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) [ 1165.996305][ T3592] IPVS: ftp: loaded support on port[0] = 21 [ 1166.017270][ T34] audit: type=1804 audit(1605832752.909:5200): pid=3602 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir603213555/syzkaller.QUy9Bl/1537/file0" dev="sda1" ino=16209 res=1 errno=0 [ 1166.094403][ T3598] IPVS: ftp: loaded support on port[0] = 21 00:39:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) 00:39:13 executing program 5: syz_mount_image$romfs(&(0x7f00000005c0)='romfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000000080), 0x0, 0xfffffffffffff976}], 0x0, &(0x7f0000000600)={[{'ns/net\x00'}, {'[(^!'}, {}, {'ns/net\x00'}, {'ns/net\x00'}, {'[}'}], [{@fowner_eq={'fowner'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ns/net\x00'}}]}) 00:39:13 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20082804ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000001c0)="d9e527473a7c8122ac3068ef6948fc2ce49e9d1b54b41462bcc82da4ac9a47d74167dafc567673955a27219dd5ec81ba02c18493eff8104bfc5b68e6f71836ec2c3562a350c5b7865892e60c6b179536b50f19212cadd890a7df0ab2886bfde4a0879dafafb925989abc326938a4ade8967f160fffadacf613c532f2dcf431a8b9581a1a5f9cde3bad5eb99d3d1133") socket$nl_netfilter(0x10, 0x3, 0xc) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x6048088) exit_group(0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) [ 1166.375442][ T3638] loop5: detected capacity change from 0 to 8385024 [ 1166.460932][ T3638] loop5: detected capacity change from 0 to 8385024 00:39:16 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x10e75}, 0x78) 00:39:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454da, 0x0) 00:39:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8946, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:39:16 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/116) 00:39:16 executing program 2: stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f00000000c0)) 00:39:16 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000140), 0x0, 0x8) 00:39:16 executing program 1: r0 = open(&(0x7f0000000240)='./file0\x00', 0x102e0, 0x0) fcntl$setsig(r0, 0xa, 0x11) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) sysfs$1(0x1, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f00000001c0)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) truncate(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, 0x0}, 0x20000001) open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) 00:39:16 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002000)='ns/net\x00') ioctl$int_out(r0, 0x5460, &(0x7f0000004080)) 00:39:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @ipv4={[], [], @local}}}) 00:39:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) 00:39:16 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x202, &(0x7f0000000200)=0x0) r4 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r4, 0x8200) pwrite64(r4, &(0x7f0000000140)='#', 0x1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1299}) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a000000}]) 00:39:16 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000140)) timer_getoverrun(0x0) 00:39:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002000)='ns/net\x00') ioctl$FICLONE(r0, 0x40049409, r0) 00:39:16 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x40) 00:39:16 executing program 4: 00:39:16 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r2, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) 00:39:16 executing program 1: r0 = open(&(0x7f0000000240)='./file0\x00', 0x102e0, 0x0) fcntl$setsig(r0, 0xa, 0x11) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) sysfs$1(0x1, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f00000001c0)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) truncate(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, 0x0}, 0x20000001) open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) 00:39:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000380)=@in, 0x80, 0x0, 0xe}, 0x0) 00:39:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002000)='ns/net\x00') ioctl$FICLONE(r0, 0x40049409, r0) 00:39:16 executing program 5: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) 00:39:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x7, 0x201}, 0x14}}, 0x0) 00:39:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e21, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0x0) 00:39:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x1a00, 0x43408) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x40, 0x12) 00:39:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891d, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) 00:39:17 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x14, r0, 0x1}, 0x14}}, 0x0) 00:39:17 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 00:39:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x30}}, 0x0) 00:39:17 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:39:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000cc0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, 0x0, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) socket$inet(0x2, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f", 0x5, 0x11, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8905, &(0x7f0000000040)) 00:39:17 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000280)=@v3, 0x18, 0x0) write$P9_RWRITE(r0, &(0x7f0000000180)={0xb}, 0xb) 00:39:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) 00:39:17 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0xa, &(0x7f0000000040), 0x4) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x24004019) 00:39:17 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 00:39:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}]}, 0x20}}, 0x0) 00:39:17 executing program 4: 00:39:17 executing program 1: 00:39:17 executing program 3: 00:39:17 executing program 0: 00:39:18 executing program 0: 00:39:18 executing program 4: 00:39:18 executing program 5: 00:39:18 executing program 1: 00:39:18 executing program 3: 00:39:18 executing program 2: 00:39:18 executing program 0: 00:39:18 executing program 5: 00:39:18 executing program 4: 00:39:18 executing program 3: 00:39:18 executing program 1: 00:39:18 executing program 1: 00:39:18 executing program 0: 00:39:18 executing program 3: 00:39:18 executing program 4: 00:39:18 executing program 5: 00:39:18 executing program 2: 00:39:18 executing program 0: 00:39:18 executing program 1: 00:39:18 executing program 3: 00:39:19 executing program 5: 00:39:19 executing program 4: 00:39:19 executing program 2: 00:39:19 executing program 1: 00:39:19 executing program 0: 00:39:19 executing program 4: 00:39:19 executing program 5: 00:39:19 executing program 3: 00:39:19 executing program 2: 00:39:19 executing program 4: 00:39:19 executing program 1: 00:39:19 executing program 0: 00:39:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00') 00:39:19 executing program 5: 00:39:19 executing program 2: 00:39:19 executing program 4: 00:39:19 executing program 0: 00:39:19 executing program 3: 00:39:19 executing program 1: 00:39:19 executing program 5: 00:39:19 executing program 2: 00:39:19 executing program 4: 00:39:19 executing program 0: 00:39:19 executing program 3: 00:39:19 executing program 1: 00:39:19 executing program 5: 00:39:20 executing program 2: 00:39:20 executing program 4: 00:39:20 executing program 0: 00:39:20 executing program 1: 00:39:20 executing program 5: 00:39:20 executing program 3: 00:39:20 executing program 2: 00:39:20 executing program 4: 00:39:20 executing program 0: 00:39:20 executing program 1: 00:39:20 executing program 5: 00:39:20 executing program 3: 00:39:20 executing program 2: 00:39:20 executing program 4: 00:39:20 executing program 0: 00:39:20 executing program 5: 00:39:20 executing program 3: 00:39:20 executing program 1: 00:39:20 executing program 2: 00:39:20 executing program 4: 00:39:20 executing program 0: 00:39:20 executing program 3: 00:39:20 executing program 5: 00:39:20 executing program 1: 00:39:20 executing program 2: 00:39:20 executing program 4: 00:39:20 executing program 0: 00:39:21 executing program 3: 00:39:21 executing program 5: 00:39:21 executing program 2: 00:39:21 executing program 1: 00:39:21 executing program 4: 00:39:21 executing program 0: 00:39:21 executing program 3: 00:39:21 executing program 2: 00:39:21 executing program 5: 00:39:21 executing program 1: 00:39:21 executing program 4: 00:39:21 executing program 0: 00:39:21 executing program 3: 00:39:21 executing program 2: 00:39:21 executing program 1: 00:39:21 executing program 4: 00:39:21 executing program 5: 00:39:21 executing program 0: 00:39:21 executing program 3: 00:39:21 executing program 2: 00:39:21 executing program 1: 00:39:21 executing program 4: 00:39:21 executing program 5: 00:39:21 executing program 0: 00:39:21 executing program 3: 00:39:21 executing program 5: 00:39:21 executing program 2: 00:39:21 executing program 4: 00:39:21 executing program 1: 00:39:21 executing program 0: 00:39:22 executing program 3: 00:39:22 executing program 4: 00:39:22 executing program 5: 00:39:22 executing program 1: 00:39:22 executing program 2: 00:39:22 executing program 0: 00:39:22 executing program 3: 00:39:22 executing program 5: 00:39:22 executing program 4: 00:39:22 executing program 1: 00:39:22 executing program 2: 00:39:22 executing program 0: 00:39:22 executing program 3: 00:39:22 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 00:39:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$lock(r0, 0x1, 0x0) 00:39:22 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000004600)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 00:39:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001240), 0x0, &(0x7f00000012c0)={[{@gqnoenforce='gqnoenforce'}]}) 00:39:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x2, 0x4) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46020000000000000000c4a40403003e000039a59424be1fd83dd2e60fc3eb1b8c43dd25a71a6f13ba7bcc22baa953d45d5d459d1cc832fae050c91d3599b5b62630dd9d3720f95739fa8f5bcf02dd66cef4e7ffd659b0645c578e8732a15e7388be61a8fbcb429148339489cf5b849d5139a9edfc9f4a815927267ebb6d6ecc9ca8a166d6b90b2272d864eff5889d39cdf96b04c259a110bcb2db37816dcaabc86d99b6fd5eac1512611c77ff58db5ed7cdfc3589b8d9a08a69ffbad3649eba"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"], 0x48}}, 0x0) 00:39:22 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 00:39:22 executing program 4: r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat(r0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000002280)={0x2020}, 0x2020) 00:39:22 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 00:39:22 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x8) [ 1175.877901][ T3979] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 00:39:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x2, 0x4) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46020000000000000000c4a40403003e000039a59424be1fd83dd2e60fc3eb1b8c43dd25a71a6f13ba7bcc22baa953d45d5d459d1cc832fae050c91d3599b5b62630dd9d3720f95739fa8f5bcf02dd66cef4e7ffd659b0645c578e8732a15e7388be61a8fbcb429148339489cf5b849d5139a9edfc9f4a815927267ebb6d6ecc9ca8a166d6b90b2272d864eff5889d39cdf96b04c259a110bcb2db37816dcaabc86d99b6fd5eac1512611c77ff58db5ed7cdfc3589b8d9a08a69ffbad3649eba"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"], 0x48}}, 0x0) [ 1175.966795][ T3971] XFS (loop0): Invalid superblock magic number [ 1176.063644][ T3994] loop4: detected capacity change from 0 to 4096 00:39:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x2, 0x4) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46020000000000000000c4a40403003e000039a59424be1fd83dd2e60fc3eb1b8c43dd25a71a6f13ba7bcc22baa953d45d5d459d1cc832fae050c91d3599b5b62630dd9d3720f95739fa8f5bcf02dd66cef4e7ffd659b0645c578e8732a15e7388be61a8fbcb429148339489cf5b849d5139a9edfc9f4a815927267ebb6d6ecc9ca8a166d6b90b2272d864eff5889d39cdf96b04c259a110bcb2db37816dcaabc86d99b6fd5eac1512611c77ff58db5ed7cdfc3589b8d9a08a69ffbad3649eba"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"], 0x48}}, 0x0) [ 1176.244003][ T4005] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 00:39:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f0000000680)={0x14, 0x3, 0x6, 0x201}, 0x14}}, 0x0) 00:39:23 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) 00:39:23 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) [ 1176.452527][ T3971] XFS (loop0): Invalid superblock magic number [ 1176.494587][ T4020] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x2, 0x4) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46020000000000000000c4a40403003e000039a59424be1fd83dd2e60fc3eb1b8c43dd25a71a6f13ba7bcc22baa953d45d5d459d1cc832fae050c91d3599b5b62630dd9d3720f95739fa8f5bcf02dd66cef4e7ffd659b0645c578e8732a15e7388be61a8fbcb429148339489cf5b849d5139a9edfc9f4a815927267ebb6d6ecc9ca8a166d6b90b2272d864eff5889d39cdf96b04c259a110bcb2db37816dcaabc86d99b6fd5eac1512611c77ff58db5ed7cdfc3589b8d9a08a69ffbad3649eba"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"], 0x48}}, 0x0) [ 1176.712537][ T4035] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:23 executing program 0: msgsnd(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"], 0x40, 0x0) 00:39:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0xff5f) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103, 0x6}, 0x60, &(0x7f0000000140)=[{&(0x7f00000027c0)="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", 0x5}, {&(0x7f0000000840)='\x00', 0xc9ed}], 0x2, 0x0, 0x0, 0x1a0}, 0x80) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)=0x1) 00:39:23 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) 00:39:23 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x30, 0xdd, 0x24, 0x20, 0xc72, 0x13, 0xf770, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x24, 0x73, 0x1e}}]}}]}}, 0x0) 00:39:23 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) 00:39:23 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) [ 1177.119326][ T9892] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 1177.159474][ T3194] usb 4-1: new high-speed USB device number 22 using dummy_hcd [ 1177.369251][ T9892] usb 5-1: Using ep0 maxpacket: 8 [ 1177.410054][ T3194] usb 4-1: Using ep0 maxpacket: 32 [ 1177.489968][ T9892] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1177.513588][ T9892] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1177.601459][ T9892] usb 5-1: config 0 descriptor?? [ 1177.643759][ T9892] gspca_main: sq905c-2.14.0 probing 2770:9050 00:39:24 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000888, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback, 0x40000000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) [ 1177.729862][ T3194] usb 4-1: New USB device found, idVendor=0c72, idProduct=0013, bcdDevice=f7.70 [ 1177.738929][ T3194] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1177.805638][ T3194] usb 4-1: Product: syz [ 1177.828490][ T3194] usb 4-1: Manufacturer: syz 00:39:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000d540)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000040)="2e00000010000523d25a80648c63940d0300fc00100002400200a06d053582c137153e370933018000f01700d1bd", 0x2e}], 0x1}, 0x0) 00:39:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0xff5f) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103, 0x6}, 0x60, &(0x7f0000000140)=[{&(0x7f00000027c0)="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", 0x5}, {&(0x7f0000000840)='\x00', 0xc9ed}], 0x2, 0x0, 0x0, 0x1a0}, 0x80) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)=0x1) [ 1177.858311][ T3194] usb 4-1: SerialNumber: syz [ 1177.897808][ T3194] usb 4-1: config 0 descriptor?? 00:39:24 executing program 5: sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r0, &(0x7f0000000080), 0x5b) 00:39:25 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000888, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback, 0x40000000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) 00:39:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000040)="2e00000010000523d25a80648c63940d0300fc00100002400200a06d053582c137153e370933018000f01700d1bd", 0x2e}], 0x1}, 0x0) 00:39:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000888, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback, 0x40000000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) [ 1178.899315][ T3194] peak_usb 4-1:0.0 can0: unable to request usb[type=0 value=1] err=-71 [ 1178.907589][ T3194] peak_usb 4-1:0.0: unable to read PCAN-Chip USB firmware info (err -71) [ 1178.969533][ T9892] gspca_sq905c: sq905c_read: usb_control_msg failed (-110) [ 1178.976760][ T9892] sq905c 5-1:0.0: Reading version command failed [ 1178.990864][ T33] usb 6-1: new high-speed USB device number 12 using dummy_hcd [ 1178.995685][ T9892] sq905c: probe of 5-1:0.0 failed with error -110 [ 1179.049861][ T3194] peak_usb: probe of 4-1:0.0 failed with error -71 [ 1179.069673][ T3194] usb 4-1: USB disconnect, device number 22 [ 1179.192222][ T9892] usb 5-1: USB disconnect, device number 7 [ 1179.229333][ T33] usb 6-1: Using ep0 maxpacket: 8 [ 1179.369798][ T33] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1179.378847][ T33] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1179.426713][ T33] usb 6-1: config 0 descriptor?? [ 1179.450882][ T3194] usb 4-1: new high-speed USB device number 23 using dummy_hcd [ 1179.510656][ T33] cp210x 6-1:0.0: cp210x converter detected [ 1179.719263][ T33] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1179.726784][ T33] cp210x 6-1:0.0: querying part number failed [ 1179.729097][ T3194] usb 4-1: Using ep0 maxpacket: 32 [ 1179.949298][ T3194] usb 4-1: unable to read config index 0 descriptor/all [ 1179.956456][ T3194] usb 4-1: can't read configurations, error -71 [ 1180.079115][ T9572] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 1180.269294][ T33] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1180.277126][ T33] cp210x: probe of ttyUSB0 failed with error -71 [ 1180.297319][ T33] usb 6-1: USB disconnect, device number 12 [ 1180.307315][ T33] cp210x 6-1:0.0: device disconnected [ 1180.349134][ T9572] usb 5-1: Using ep0 maxpacket: 8 00:39:27 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x33) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x33) dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000888, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback, 0x40000000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) 00:39:27 executing program 2: syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000740)={0x2c, &(0x7f0000000d00)=ANY=[@ANYBLOB="0000b0000000b0"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f0000000080)='/dev/usb/hiddev#\x00', 0x0, 0x0) ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0x100, 0xfc}) 00:39:27 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x5ac, 0x8243, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000740)={0x18, &(0x7f0000000d00)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCINITREPORT(r1, 0x4805, 0x0) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, &(0x7f0000000140)={0x0, 0x1}) syz_open_dev$hiddev(&(0x7f0000000080)='/dev/usb/hiddev#\x00', 0x0, 0x0) ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0x100, 0xfc}) 00:39:27 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)) fcntl$setsig(r1, 0xa, 0x12) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) poll(&(0x7f0000000180)=[{r2}], 0x1, 0xfffffffffffffff8) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 00:39:27 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1180.489425][ T9572] usb 5-1: unable to read config index 0 descriptor/start: -71 [ 1180.503914][ T9572] usb 5-1: can't read configurations, error -71 00:39:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bic\x00', 0x9) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x10) 00:39:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1180.929402][ T9572] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 1181.040225][T12603] usb 6-1: new high-speed USB device number 13 using dummy_hcd 00:39:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000005, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 1181.189658][ T9572] usb 5-1: Using ep0 maxpacket: 8 [ 1181.293019][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1181.330567][ T9572] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1181.361649][ T9572] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1181.423275][ T9572] usb 5-1: config 0 descriptor?? [ 1181.441943][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1181.471504][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 00:39:28 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1181.521791][ T9572] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1181.544196][T12603] usb 6-1: config 0 descriptor?? [ 1181.591557][T12603] usb 6-1: can't set config #0, error -71 [ 1181.601152][T12603] usb 6-1: USB disconnect, device number 13 00:39:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1182.099296][T12603] usb 6-1: new high-speed USB device number 14 using dummy_hcd 00:39:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x3e) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffc]}, 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x80000009}) poll(&(0x7f0000000180)=[{r2}], 0x1, 0xfffffffffffffff8) tkill(r0, 0x14) [ 1182.239187][ T9572] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 1182.252140][ T9572] sq905c 5-1:0.0: Reading version command failed [ 1182.291317][ T9572] sq905c: probe of 5-1:0.0 failed with error -71 [ 1182.338637][ T9572] usb 5-1: USB disconnect, device number 9 [ 1182.359324][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1182.490163][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1182.510485][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1182.565954][T12603] usb 6-1: config 0 descriptor?? [ 1182.640781][T12603] cp210x 6-1:0.0: cp210x converter detected 00:39:29 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1182.879219][T12603] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1182.894301][T12603] cp210x 6-1:0.0: querying part number failed 00:39:29 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1183.299174][T23194] usb 5-1: new high-speed USB device number 10 using dummy_hcd [ 1183.409166][T12603] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1183.422443][T12603] cp210x: probe of ttyUSB0 failed with error -71 [ 1183.488258][T12603] usb 6-1: USB disconnect, device number 14 00:39:30 executing program 3: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) [ 1183.561040][T12603] cp210x 6-1:0.0: device disconnected [ 1183.569162][T23194] usb 5-1: Using ep0 maxpacket: 8 00:39:30 executing program 1: [ 1183.690011][T23194] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1183.721112][T23194] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1183.808072][T23194] usb 5-1: config 0 descriptor?? [ 1183.882650][T23194] gspca_main: sq905c-2.14.0 probing 2770:9050 00:39:30 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x61, 0x9, 0x93, 0x20, 0xa47, 0x9601, 0xe642, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xef, 0x32, 0x1c}}]}}]}}, 0x0) 00:39:31 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "d45c92dee64ca5263113cc418a"}]}, 0x40}}, 0x0) [ 1184.170934][ T3194] usb 4-1: new high-speed USB device number 25 using dummy_hcd 00:39:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 00:39:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000010008108040f9becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020200bf050005001201", 0x2e}], 0x1}, 0x0) [ 1184.469665][ T3001] usb 6-1: new high-speed USB device number 15 using dummy_hcd [ 1184.529228][ T3194] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1184.560975][ T3194] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1184.598755][ T3194] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 1184.622894][ T4307] device batadv0 entered promiscuous mode [ 1184.649461][T23194] gspca_sq905c: sq905c_read: usb_control_msg failed (-110) [ 1184.659500][T23194] sq905c 5-1:0.0: Reading version command failed [ 1184.666660][ T3194] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1184.695866][T23194] sq905c: probe of 5-1:0.0 failed with error -110 [ 1184.730410][ T3001] usb 6-1: Using ep0 maxpacket: 8 [ 1184.742244][ T3194] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1184.850280][ T3001] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1184.866489][ T3001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1184.886872][ T3001] usb 6-1: config 0 descriptor?? [ 1184.930948][ T3001] cp210x 6-1:0.0: cp210x converter detected [ 1184.979918][ T3194] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1184.998151][ T3194] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1185.037670][ T3194] usb 4-1: Product: syz [ 1185.100536][ T3194] usb 4-1: Manufacturer: syz [ 1185.118578][ T4309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1185.142102][ T3194] usb 4-1: SerialNumber: syz [ 1185.169189][ T3001] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1185.182238][ T3001] cp210x 6-1:0.0: querying part number failed [ 1185.206207][ T7] usb 5-1: USB disconnect, device number 10 00:39:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x3e) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffc]}, 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x80000009}) poll(&(0x7f0000000180)=[{r2}], 0x1, 0xfffffffffffffff8) tkill(r0, 0x14) [ 1185.417800][ T4285] raw-gadget gadget: fail, usb_ep_enable returned -22 00:39:32 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1185.679334][ T3001] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1185.686465][ T3001] cp210x: probe of ttyUSB0 failed with error -71 [ 1185.751736][ T3001] usb 6-1: USB disconnect, device number 15 [ 1185.787583][ T3001] cp210x 6-1:0.0: device disconnected [ 1186.044894][ T4309] 8021q: adding VLAN 0 to HW filter on device batadv0 00:39:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000010008108040f9becdb4cb92e0a48b1371400000069bd6efb2503eaff0d000100020200bf050005001201", 0x2e}], 0x1}, 0x0) [ 1186.115862][ T4309] syz-executor.0 (4309) used greatest stack depth: 22424 bytes left [ 1186.138915][T12603] usb 5-1: new high-speed USB device number 11 using dummy_hcd [ 1186.151196][ T4285] raw-gadget gadget: fail, usb_ep_enable returned -22 00:39:33 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1186.440042][ T3194] cdc_ncm 4-1:1.0: bind() failure [ 1186.449103][T12603] usb 5-1: Using ep0 maxpacket: 8 [ 1186.520204][ T3194] cdc_ncm: probe of 4-1:1.1 failed with error -71 [ 1186.538252][ T4350] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1186.570078][ T3194] cdc_mbim: probe of 4-1:1.1 failed with error -71 [ 1186.580028][T12603] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1186.609247][ T3194] usbtest: probe of 4-1:1.1 failed with error -71 [ 1186.621718][T12603] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1186.644680][ T3194] usb 4-1: USB disconnect, device number 25 00:39:33 executing program 0: syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1186.679331][T23194] usb 6-1: new high-speed USB device number 16 using dummy_hcd [ 1186.696475][T12603] usb 5-1: config 0 descriptor?? [ 1186.716387][ T4350] syz-executor.0 (4350) used greatest stack depth: 22352 bytes left [ 1186.781626][T12603] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1186.935325][T23194] usb 6-1: Using ep0 maxpacket: 8 [ 1187.070787][T23194] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1187.100701][T23194] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1187.172552][T23194] usb 6-1: config 0 descriptor?? [ 1187.250761][T23194] cp210x 6-1:0.0: cp210x converter detected [ 1187.389239][T31013] usb 4-1: new high-speed USB device number 26 using dummy_hcd [ 1187.450247][T23194] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1187.457780][T23194] cp210x 6-1:0.0: querying part number failed [ 1187.571183][T12603] gspca_sq905c: sq905c_read: usb_control_msg failed (-110) [ 1187.578416][T12603] sq905c 5-1:0.0: Reading version command failed [ 1187.621204][T12603] sq905c: probe of 5-1:0.0 failed with error -110 [ 1187.684393][ T3194] usb 5-1: USB disconnect, device number 11 [ 1187.759260][T31013] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1187.770858][T31013] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1187.792956][T31013] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 1187.807040][T31013] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1187.824960][T31013] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 00:39:34 executing program 3: 00:39:34 executing program 1: 00:39:34 executing program 1: [ 1188.019201][T31013] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1188.039396][T23194] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1188.048616][T23194] cp210x: probe of ttyUSB0 failed with error -71 [ 1188.058556][T31013] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1188.088586][T31013] usb 4-1: Product: syz [ 1188.097052][T23194] usb 6-1: USB disconnect, device number 16 [ 1188.123729][T23194] cp210x 6-1:0.0: device disconnected 00:39:35 executing program 3: [ 1188.139291][T31013] usb 4-1: can't set config #1, error -71 [ 1188.157578][T31013] usb 4-1: USB disconnect, device number 26 00:39:35 executing program 0: 00:39:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bic\x00', 0x9) sendto$inet(r0, 0x0, 0x0, 0x20001732, &(0x7f00000003c0)={0x2, 0x0, @local}, 0x10) 00:39:35 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:39:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x3e) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffc]}, 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x80000009}) poll(&(0x7f0000000180)=[{r2}], 0x1, 0xfffffffffffffff8) tkill(r0, 0x14) 00:39:35 executing program 3: 00:39:35 executing program 0: 00:39:35 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) 00:39:35 executing program 1: 00:39:35 executing program 3: 00:39:35 executing program 0: [ 1188.669329][T23196] usb 5-1: new high-speed USB device number 12 using dummy_hcd 00:39:35 executing program 3: 00:39:35 executing program 1: 00:39:35 executing program 0: 00:39:35 executing program 3: [ 1188.919234][T23196] usb 5-1: Using ep0 maxpacket: 8 [ 1189.049229][T23196] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1189.058910][T23196] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1189.059323][ T3194] usb 6-1: new high-speed USB device number 17 using dummy_hcd [ 1189.086583][T23196] usb 5-1: config 0 descriptor?? [ 1189.131712][T23196] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1189.359235][ T3194] usb 6-1: Using ep0 maxpacket: 8 [ 1189.479301][ T3194] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1189.492608][ T3194] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1189.523093][ T3194] usb 6-1: config 0 descriptor?? [ 1189.570453][ T3194] cp210x 6-1:0.0: cp210x converter detected [ 1189.609409][T23196] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 1189.616558][T23196] sq905c 5-1:0.0: Reading version command failed [ 1189.639273][T23196] sq905c: probe of 5-1:0.0 failed with error -71 [ 1189.658449][T23196] usb 5-1: USB disconnect, device number 12 [ 1189.789421][ T3194] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1189.801818][ T3194] cp210x 6-1:0.0: querying part number failed [ 1190.090147][ T3194] cp210x ttyUSB0: failed set request 0x3 status: -71 [ 1190.102647][ T3194] cp210x: probe of ttyUSB0 failed with error -71 [ 1190.112558][ T3194] usb 6-1: USB disconnect, device number 17 [ 1190.119534][ T3194] cp210x 6-1:0.0: device disconnected 00:39:37 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) [ 1190.529199][T23194] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 1190.809149][T23194] usb 5-1: Using ep0 maxpacket: 8 [ 1190.949352][T23194] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1190.958410][T23194] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1190.979768][T23194] usb 5-1: config 0 descriptor?? [ 1191.032092][T23194] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1191.489248][T23194] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 1191.496382][T23194] sq905c 5-1:0.0: Reading version command failed [ 1191.516160][T23194] sq905c: probe of 5-1:0.0 failed with error -71 [ 1191.526890][T23194] usb 5-1: USB disconnect, device number 13 00:39:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x3e) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffc]}, 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x80000009}) poll(&(0x7f0000000180)=[{r2}], 0x1, 0xfffffffffffffff8) tkill(r0, 0x14) 00:39:38 executing program 1: 00:39:38 executing program 3: 00:39:38 executing program 0: 00:39:38 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) 00:39:38 executing program 3: 00:39:38 executing program 1: 00:39:38 executing program 0: 00:39:38 executing program 1: 00:39:38 executing program 3: 00:39:38 executing program 0: [ 1191.969262][T12603] usb 6-1: new high-speed USB device number 18 using dummy_hcd 00:39:39 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 1192.239103][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1192.359816][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1192.368897][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1192.379270][T23194] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 1192.401998][T12603] usb 6-1: config 0 descriptor?? [ 1192.440512][T12603] cp210x 6-1:0.0: cp210x converter detected [ 1192.619111][T23194] usb 5-1: Using ep0 maxpacket: 8 [ 1192.649803][T12603] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1192.657389][T12603] cp210x 6-1:0.0: querying part number failed [ 1192.769336][T23194] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1192.780562][T23194] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1192.802168][T23194] usb 5-1: config 0 descriptor?? [ 1192.871863][T23194] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1192.949345][T12603] cp210x ttyUSB0: failed set request 0x3 status: -71 [ 1192.957470][T12603] cp210x: probe of ttyUSB0 failed with error -71 [ 1192.982420][T12603] usb 6-1: USB disconnect, device number 18 [ 1192.990531][T12603] cp210x 6-1:0.0: device disconnected [ 1193.309164][T23194] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 1193.317240][T23194] sq905c 5-1:0.0: Reading version command failed [ 1193.337861][T23194] sq905c: probe of 5-1:0.0 failed with error -71 [ 1193.355054][T23194] usb 5-1: USB disconnect, device number 14 00:39:41 executing program 2: 00:39:41 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) 00:39:41 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) socket$inet6(0xa, 0x1, 0x8010000000000084) 00:39:41 executing program 3: 00:39:41 executing program 1: 00:39:41 executing program 0: 00:39:41 executing program 3: 00:39:41 executing program 1: 00:39:41 executing program 0: 00:39:41 executing program 2: 00:39:41 executing program 1: 00:39:41 executing program 3: 00:39:41 executing program 0: [ 1195.019160][T12603] usb 5-1: new high-speed USB device number 15 using dummy_hcd 00:39:42 executing program 2: 00:39:42 executing program 1: [ 1195.070032][T23194] usb 6-1: new high-speed USB device number 19 using dummy_hcd 00:39:42 executing program 0: [ 1195.269256][T12603] usb 5-1: Using ep0 maxpacket: 8 [ 1195.319120][T23194] usb 6-1: Using ep0 maxpacket: 8 [ 1195.390464][T12603] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1195.419180][T12603] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1195.449377][T23194] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1195.458447][T23194] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1195.468600][T12603] usb 5-1: config 0 descriptor?? [ 1195.495896][T23194] usb 6-1: config 0 descriptor?? [ 1195.522938][T12603] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1195.540449][T23194] cp210x 6-1:0.0: cp210x converter detected [ 1195.749464][T23194] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1195.756963][T23194] cp210x 6-1:0.0: querying part number failed [ 1195.960009][T12603] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 1195.967153][T12603] sq905c 5-1:0.0: Reading version command failed [ 1195.977315][T12603] sq905c: probe of 5-1:0.0 failed with error -71 [ 1195.989224][T12603] usb 5-1: USB disconnect, device number 15 [ 1196.049320][T23194] cp210x ttyUSB0: failed set request 0x3 status: -71 [ 1196.057797][T23194] cp210x: probe of ttyUSB0 failed with error -71 [ 1196.070133][T23194] usb 6-1: USB disconnect, device number 19 [ 1196.079344][T23194] cp210x 6-1:0.0: device disconnected 00:39:43 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:43 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) 00:39:43 executing program 3: 00:39:43 executing program 2: 00:39:43 executing program 1: 00:39:43 executing program 0: 00:39:43 executing program 1: 00:39:43 executing program 2: 00:39:43 executing program 0: 00:39:43 executing program 3: 00:39:43 executing program 1: 00:39:43 executing program 0: [ 1196.929171][ T3001] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 1196.999099][T23194] usb 6-1: new high-speed USB device number 20 using dummy_hcd [ 1197.169159][ T3001] usb 5-1: Using ep0 maxpacket: 8 [ 1197.239261][T23194] usb 6-1: Using ep0 maxpacket: 8 [ 1197.296537][ T3001] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1197.319084][ T3001] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1197.351815][ T3001] usb 5-1: config 0 descriptor?? [ 1197.359909][T23194] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1197.369107][T23194] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1197.393051][ T3001] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1197.405549][T23194] usb 6-1: config 0 descriptor?? [ 1197.470560][T23194] cp210x 6-1:0.0: cp210x converter detected [ 1197.689146][T23194] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1197.696667][T23194] cp210x 6-1:0.0: querying part number failed [ 1197.739242][T23194] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1197.746316][T23194] cp210x: probe of ttyUSB0 failed with error -71 [ 1197.770044][T23194] usb 6-1: USB disconnect, device number 20 [ 1197.795952][T23194] cp210x 6-1:0.0: device disconnected [ 1197.834988][ T3001] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 1197.845516][ T3001] sq905c 5-1:0.0: Reading version command failed [ 1197.864690][ T3001] sq905c: probe of 5-1:0.0 failed with error -71 [ 1197.874386][ T3001] usb 5-1: USB disconnect, device number 16 00:39:45 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:45 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 00:39:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @private}, 0x10) 00:39:45 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$inet(r0, &(0x7f0000001740)=[{{&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000001ac0)=ANY=[], 0x120}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @private}}}], 0x20}}], 0x2, 0x0) 00:39:45 executing program 1: socketpair(0x1e, 0x0, 0x9, 0x0) 00:39:45 executing program 0: r0 = timerfd_create(0x9, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000540)={{0x0, 0x989680}, {0x0, r1+60000000}}, 0x0) 00:39:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001140)={0x14, 0x2, 0x2, 0x5}, 0x14}}, 0x0) 00:39:45 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000100)={'ip6_vti0\x00', @ifru_map}) 00:39:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x0, 0xb, 0x201, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x6, 0x1, '-\x00'}]}, 0x1c}}, 0x0) 00:39:45 executing program 0: syz_open_procfs(0x0, &(0x7f00000007c0)='net/ptype\x00') [ 1198.539432][T12603] usb 6-1: new high-speed USB device number 21 using dummy_hcd 00:39:45 executing program 1: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f00000012c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001180), 0x0, &(0x7f00000011c0)={[{@anchor={'anchor'}}, {@uid_ignore='uid=ignore'}, {@rootdir={'rootdir'}}]}) 00:39:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[], 0x34}}, 0x0) [ 1198.769313][ T3001] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 1198.793796][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1198.866453][ T4720] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found [ 1198.898385][ T4720] UDF-fs: Scanning with blocksize 512 failed [ 1198.919190][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1198.934514][ T4720] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found [ 1198.944810][ T4720] UDF-fs: Scanning with blocksize 1024 failed [ 1198.949946][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1198.959564][ T4720] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found [ 1198.967138][ T4720] UDF-fs: Scanning with blocksize 2048 failed [ 1198.984552][ T4720] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found [ 1198.984576][T12603] usb 6-1: config 0 descriptor?? [ 1198.992308][ T4720] UDF-fs: Scanning with blocksize 4096 failed [ 1199.039255][ T3001] usb 5-1: Using ep0 maxpacket: 8 [ 1199.080451][T12603] cp210x 6-1:0.0: cp210x converter detected [ 1199.159401][ T3001] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1199.168456][ T3001] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1199.190556][ T3001] usb 5-1: config 0 descriptor?? [ 1199.231699][ T3001] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1199.299191][T12603] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1199.306701][T12603] cp210x 6-1:0.0: querying part number failed [ 1199.379226][T12603] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1199.387623][T12603] cp210x: probe of ttyUSB0 failed with error -71 [ 1199.420469][T12603] usb 6-1: USB disconnect, device number 21 [ 1199.437988][T12603] cp210x 6-1:0.0: device disconnected [ 1199.659163][ T3001] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 1199.666398][ T3001] sq905c 5-1:0.0: Reading version command failed [ 1199.676642][ T3001] sq905c: probe of 5-1:0.0 failed with error -71 [ 1199.688440][ T3001] usb 5-1: USB disconnect, device number 17 00:39:46 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:47 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='maps\x00') 00:39:47 executing program 1: syz_mount_image$iso9660(&(0x7f0000000380)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)) faccessat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2) 00:39:47 executing program 0: ioctl$IOCTL_VMCI_CTX_REMOVE_NOTIFICATION(0xffffffffffffffff, 0x7b0, 0x0) 00:39:47 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) 00:39:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60216, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1200.189329][ T3001] usb 6-1: new high-speed USB device number 22 using dummy_hcd 00:39:47 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000340), &(0x7f0000000380)=0x4) 00:39:47 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000000)={'veth1_macvtap\x00', @ifru_map}) 00:39:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x2, 0x4e20, @empty}, 0x10) 00:39:47 executing program 1: syz_open_dev$sg(&(0x7f00000004c0)='/dev/sg#\x00', 0x0, 0x1b3400) 00:39:47 executing program 0: syz_open_procfs(0x0, &(0x7f0000005b80)='net/tcp6\x00') [ 1200.416474][ T4776] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1200.449236][ T3001] usb 6-1: Using ep0 maxpacket: 8 00:39:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f00000076c0)=[{{&(0x7f00000007c0)=@can, 0x80, &(0x7f0000001f00)=[{&(0x7f0000000840)=""/158, 0x9e}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x2, &(0x7f0000007940)) [ 1200.569747][ T3001] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1200.591774][ T3001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1200.609113][ T3194] usb 5-1: new high-speed USB device number 18 using dummy_hcd [ 1200.651359][ T3001] usb 6-1: config 0 descriptor?? [ 1200.710664][ T3001] cp210x 6-1:0.0: cp210x converter detected [ 1200.859118][ T3194] usb 5-1: Using ep0 maxpacket: 8 [ 1200.929216][ T3001] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1200.943784][ T3001] cp210x 6-1:0.0: querying part number failed [ 1200.979866][ T3194] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1200.997159][ T3194] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1201.028110][ T3194] usb 5-1: config 0 descriptor?? [ 1201.033689][ T3001] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1201.045549][ T3001] cp210x: probe of ttyUSB0 failed with error -71 [ 1201.065283][ T3001] usb 6-1: USB disconnect, device number 22 [ 1201.083741][ T3001] cp210x 6-1:0.0: device disconnected [ 1201.092434][ T3194] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1201.309703][ T3194] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 1201.317127][ T3194] sq905c 5-1:0.0: Get version command failed [ 1201.338342][ T3194] sq905c: probe of 5-1:0.0 failed with error -71 [ 1201.347961][ T3194] usb 5-1: USB disconnect, device number 18 00:39:48 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 00:39:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000020c0)='net/rt_cache\x00') read$FUSE(r0, 0x0, 0x0) 00:39:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_int(r0, 0x0, 0x12, 0x0, 0x0) 00:39:48 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) 00:39:48 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mountinfo\x00') 00:39:48 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x0) 00:39:48 executing program 2: r0 = socket(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 00:39:48 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x8}, 0x0, 0x0) 00:39:48 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x3a) [ 1201.949092][T23194] usb 6-1: new high-speed USB device number 23 using dummy_hcd 00:39:48 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c212cd64880079442f383d9f706ec527eae831f2321f0e23cbcc3489eb914d7644bf768eb26e5d95f1eb99c55a172e03faa2ca84454d4e482b07aeaa380733", 0x21}, 0x60) 00:39:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x4801) [ 1202.201028][T23194] usb 6-1: Using ep0 maxpacket: 8 [ 1202.239092][T12603] usb 5-1: new high-speed USB device number 19 using dummy_hcd [ 1202.340126][T23194] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1202.349598][T23194] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1202.373007][T23194] usb 6-1: config 0 descriptor?? [ 1202.420486][T23194] cp210x 6-1:0.0: cp210x converter detected [ 1202.490503][T12603] usb 5-1: Using ep0 maxpacket: 8 [ 1202.629350][T12603] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1202.666471][T12603] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1202.683562][T12603] usb 5-1: config 0 descriptor?? [ 1202.731605][T12603] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1202.859234][T23194] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1202.868802][T23194] cp210x: probe of ttyUSB0 failed with error -71 [ 1202.891767][T23194] usb 6-1: USB disconnect, device number 23 [ 1202.906917][T23194] cp210x 6-1:0.0: device disconnected [ 1202.967053][T12603] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 1202.974540][T12603] sq905c 5-1:0.0: Get version command failed [ 1202.989335][T12603] sq905c: probe of 5-1:0.0 failed with error -71 [ 1202.997574][T12603] usb 5-1: USB disconnect, device number 19 00:39:50 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') 00:39:50 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='fd/3\x00') mmap$snddsp_control(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x83000000) 00:39:50 executing program 0: io_setup(0x1, &(0x7f0000000000)=0x0) io_getevents(r0, 0xbe0, 0x0, 0x0, 0x0) 00:39:50 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:50 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) 00:39:50 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$mptcp(&(0x7f0000000100)='mptcp_pm\x00') 00:39:50 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:39:50 executing program 0: socket(0x0, 0xc32636a1c608c8a6, 0x0) 00:39:50 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockname(r0, 0x0, 0x0) 00:39:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, {0x2, 0x0, @loopback}, 0x184, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9}) 00:39:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@remote, @multicast1, @private}, 0xc) 00:39:50 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000000)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xee01}) [ 1203.759375][T12603] usb 6-1: new high-speed USB device number 24 using dummy_hcd [ 1203.939308][ T33] usb 5-1: new high-speed USB device number 20 using dummy_hcd [ 1204.000688][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1204.125561][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1204.141828][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1204.173698][T12603] usb 6-1: config 0 descriptor?? [ 1204.189342][ T33] usb 5-1: Using ep0 maxpacket: 8 [ 1204.240500][T12603] cp210x 6-1:0.0: cp210x converter detected [ 1204.309226][ T33] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1204.318295][ T33] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1204.343645][ T33] usb 5-1: config 0 descriptor?? [ 1204.383165][ T33] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1204.589169][ T33] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 1204.596574][ T33] sq905c 5-1:0.0: Get version command failed [ 1204.611374][ T33] sq905c: probe of 5-1:0.0 failed with error -71 [ 1204.624075][ T33] usb 5-1: USB disconnect, device number 20 [ 1204.679319][T12603] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1204.688961][T12603] cp210x: probe of ttyUSB0 failed with error -71 [ 1204.714987][T12603] usb 6-1: USB disconnect, device number 24 [ 1204.728034][T12603] cp210x 6-1:0.0: device disconnected 00:39:52 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/146, &(0x7f0000000240)=0x92) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r5, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r5}}, 0x20}}, 0x0) 00:39:52 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') 00:39:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000200)=@req3, 0x1c) 00:39:52 executing program 1: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0x7) 00:39:52 executing program 4: syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) [ 1205.314307][ T4973] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x4}}, 0x0) 00:39:52 executing program 1: r0 = socket(0x2, 0x3, 0x1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x8081) 00:39:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@dmode={'dmode', 0x3d, 0x80000000}}]}) [ 1205.465405][ T4978] batman_adv: batadv0: Adding interface: veth3 [ 1205.476168][ T4978] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. [ 1205.518597][ T4978] batman_adv: batadv0: Not using interface veth3 (retrying later): interface not active 00:39:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/143, 0x8f}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) [ 1205.615656][T12603] usb 6-1: new high-speed USB device number 25 using dummy_hcd [ 1205.635572][ T4973] batman_adv: batadv0: Removing interface: veth3 00:39:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}}}) [ 1205.780301][ T4973] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:52 executing program 2: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f00000073c0)={&(0x7f0000000240)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000035c0)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, &(0x7f0000007100)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}, @mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}], 0xb0}, 0x0) [ 1205.869078][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1205.911856][ T5011] batman_adv: batadv0: Adding interface: veth3 [ 1205.918196][ T5011] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. [ 1205.992683][ T5011] batman_adv: batadv0: Not using interface veth3 (retrying later): interface not active [ 1206.009870][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1206.018922][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1206.062011][T12603] usb 6-1: config 0 descriptor?? [ 1206.110636][T12603] cp210x 6-1:0.0: cp210x converter detected [ 1206.539186][T12603] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1206.546449][T12603] cp210x: probe of ttyUSB0 failed with error -71 [ 1206.589608][T12603] usb 6-1: USB disconnect, device number 25 [ 1206.606627][T12603] cp210x 6-1:0.0: device disconnected 00:39:54 executing program 5: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 00:39:54 executing program 4: syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) 00:39:54 executing program 0: r0 = socket(0x2, 0x3, 0x1) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 00:39:54 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x1, 0x8, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') 00:39:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/146, &(0x7f0000000240)=0x92) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r5, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r5}}, 0x20}}, 0x0) 00:39:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000001900)={&(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "780402f88dccd6480178b9161a21d3e09884264cbd9cd97f93dea95deb2cdac91f7b7952af1f74a323895ebfbbfc847e2265db01dc90227a8a26080821af52"}, 0x60, 0x0}, 0x0) 00:39:54 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={0x0}}, 0x0) [ 1207.140162][ T5048] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:54 executing program 1: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f00000073c0)={&(0x7f0000000240)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) 00:39:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000002c0)="8e", 0x1, 0x0, &(0x7f00000003c0)={0x2, 0x4e20, @empty}, 0x10) [ 1207.245319][ T5054] batman_adv: batadv0: Adding interface: veth5 [ 1207.313924][ T5054] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. 00:39:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @empty}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)='wlan0\x00'}) 00:39:54 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001000)={0xffffffffffffffff}) accept4$bt_l2cap(r1, 0x0, 0x0, 0x0) [ 1207.440999][ T5054] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active 00:39:54 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f0000000180)=0x1e) [ 1207.543803][ T5048] batman_adv: batadv0: Removing interface: veth5 00:39:54 executing program 5: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 00:39:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x0) 00:39:54 executing program 4: syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) 00:39:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000200)=@req3={0x0, 0x0, 0x0, 0x200}, 0x1c) 00:39:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/146, &(0x7f0000000240)=0x92) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r5, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r5}}, 0x20}}, 0x0) 00:39:54 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/143, 0x8f}}], 0x1, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 00:39:54 executing program 2: r0 = socket(0x2, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "5a9dc938e807b4320253ab668500a62a259f82ca72ac9b0445d18ef877035d1e6e4d968023803c88d6ee3f1b51c1b302af218feb5f63c81a0d998a665da313"}, 0x60) 00:39:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c0000000206050000000000000000000000000014000300686173683a58702c706f72742c69700005000400000000000900020073797a3000000000050005000a000000050001000600"], 0x4c}}, 0x0) [ 1208.048104][ T5090] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:55 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/143, 0x8f}}], 0x1, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) [ 1208.145523][ T5094] batman_adv: batadv0: Adding interface: veth5 00:39:55 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') [ 1208.193753][ T5094] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. [ 1208.289556][ T5094] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active [ 1208.412741][ T5090] batman_adv: batadv0: Removing interface: veth5 [ 1208.420006][ T5110] Can't find ip_set type hash:Xp,port,ip 00:39:55 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 00:39:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/icmp\x00') mmap$snddsp_control(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x83000000) 00:39:55 executing program 5: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 00:39:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c0000000206050000000000000000000000000014000300686173683a58702c706f72742c69700005000400000000000900020073797a3000000000050005000a000000050001000600"], 0x4c}}, 0x0) 00:39:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x18, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}}, 0x0) 00:39:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/146, &(0x7f0000000240)=0x92) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r5, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r5}}, 0x20}}, 0x0) 00:39:55 executing program 2: syz_open_procfs(0x0, &(0x7f0000002040)='net/igmp\x00') 00:39:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000a40)={'ip_vti0\x00', 0x0}) 00:39:55 executing program 1: modify_ldt$read_default(0x2, &(0x7f00000024c0)=""/235, 0xeb) syz_usbip_server_init(0x0) [ 1208.911899][ T5132] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:56 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'veth0_to_bond\x00', @ifru_map}) [ 1209.036103][ T5142] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 00:39:56 executing program 0: syz_mount_image$affs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001a40)=[{&(0x7f0000000700)="dd579617db42a729eb31944cfe1dc2533ddb57044e35c4bd953f7e46d87869584c4f25ac9b4144c4e4a2eeab870fe8f1eb495c398edf9431915641b1337b617d6972bf7fb6fb131125aede657b44a4e513fa3b44f11cb57b0dfc65956425f7a5a3fbed2c2b0742b30e49fc73d70f43e430c7f4439015ce75fdfca3ec98e557b8465a369838fba22115efd178d552185cde4822ac87b4d107f23fa86d8ff57a8e565edba76198f70111a4b167d2349e059c0bb87ec660679878229367fc89a8bc3b2809f144b992b419549db05c1b8144481a10468933ae1f000e73f409b6c4f2d5342ae66de03e20cf4fa48c116d7b", 0xef, 0x100000000}], 0x0, &(0x7f0000001b00)={[{'errors=withdraw'}, {':$('}, {}, {'ignore_local_fs'}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@hash='hash'}, {@uid_gt={'uid>'}}, {@dont_appraise='dont_appraise'}, {@smackfsroot={'smackfsroot', 0x3d, 'ignore_local_fs'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ignore_local_fs'}}, {@fsname={'fsname', 0x3d, 'errors=withdraw'}}, {@audit='audit'}]}) [ 1209.129715][ T5132] batman_adv: batadv0: Adding interface: veth5 [ 1209.135904][ T5132] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. [ 1209.186105][ T5132] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active 00:39:56 executing program 5: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1209.298741][ T5148] loop0: detected capacity change from 0 to 135266304 [ 1209.299737][ T5138] batman_adv: batadv0: Removing interface: veth5 00:39:56 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 00:39:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0xfffffffffffffe1a, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}}, 0x0) [ 1209.423966][ T5148] loop0: detected capacity change from 0 to 135266304 00:39:56 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @broadcast}}) 00:39:56 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 00:39:56 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/netlink\x00') 00:39:56 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/146, &(0x7f0000000240)=0x92) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:39:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000003ec0)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x90) 00:39:56 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)={[{@nobarrier='nobarrier'}, {@creator={'creator', 0x3d, "685348d8"}}, {@nodecompose='nodecompose'}, {@gid={'gid'}}], [{@fowner_eq={'fowner'}}]}) 00:39:56 executing program 1: socketpair(0x3, 0x0, 0x0, 0x0) [ 1209.970098][ T5176] hfsplus: unable to parse mount options 00:39:57 executing program 0: read$usbfs(0xffffffffffffffff, 0x0, 0x0) [ 1210.014232][ T5176] hfsplus: unable to parse mount options [ 1210.019687][ T5183] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:57 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 00:39:57 executing program 5: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:57 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_int(r0, 0x0, 0xd, 0x0, 0x0) [ 1210.190406][ T5188] batman_adv: batadv0: Adding interface: veth5 00:39:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f00000076c0)=[{{0x0, 0x0, &(0x7f0000001f00)=[{0x0}, {0x0}, {&(0x7f0000001bc0)=""/132, 0x84}], 0x3}}], 0x1, 0x0, 0x0) [ 1210.254700][ T5188] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. 00:39:57 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast2, 0x0, 0x0, 0x3, 0x9, 0x0, 0x9}, 0x20) 00:39:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, {0x2, 0x0, @loopback}, 0x184, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='gre0\x00'}) [ 1210.356218][ T5188] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active 00:39:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001200)='/dev/kvm\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 00:39:57 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)=""/146, &(0x7f0000000240)=0x92) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:39:57 executing program 2: socket$inet(0x2, 0x0, 0x40000) 00:39:57 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') [ 1210.674693][ T5214] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:57 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 00:39:57 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x0, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) [ 1210.790053][ T5214] batman_adv: batadv0: Adding interface: veth7 [ 1210.813854][ T5214] batman_adv: batadv0: The MTU of interface veth7 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. 00:39:57 executing program 5: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) 00:39:57 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000100)=@name={0x1e, 0x2, 0x1, {{0x1, 0x4}}}, 0x10) [ 1210.912576][ T5214] batman_adv: batadv0: Not using interface veth7 (retrying later): interface not active 00:39:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000004080)={0x0, 0x0, &(0x7f0000004040)={&(0x7f0000003b80)=ANY=[@ANYBLOB="bc040000010501010000000000000000000000025402010001000000020000007f0803000700150073797a30000000000000000000000000000000000000000000000000000000006f90473b22982db1e6e29468b4e2e7640fa68dcc120ba3b9eb0cd63d43c8d6dc2ea8da58c8ae50a285a85e31d247b26891e7ae2f9272a5ce4a339e8529ae94e20300080000000000fd0300000300400000"], 0x4bc}, 0x1, 0x0, 0x0, 0x20000040}, 0x804) 00:39:58 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1211.047750][ T5231] tipc: Can't bind to reserved service type 1 00:39:58 executing program 2: syz_usbip_server_init(0x41d0fa1bc329990) 00:39:58 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @struct}}) sched_rr_get_interval(0x0, &(0x7f0000000440)) [ 1211.156940][ T5241] netlink: 596 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:58 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001780)={[{@nocompress='nocompress'}, {@utf8='utf8'}]}) [ 1211.239098][ T33] usb 5-1: new high-speed USB device number 21 using dummy_hcd [ 1211.247505][ T5244] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:58 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x3938700}) [ 1211.340648][ T5247] batman_adv: batadv0: Adding interface: veth9 [ 1211.384221][ T5247] batman_adv: batadv0: The MTU of interface veth9 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. [ 1211.437677][ T5247] batman_adv: batadv0: Not using interface veth9 (retrying later): interface not active [ 1211.489265][ T33] usb 5-1: device descriptor read/64, error 18 [ 1211.569116][ T5257] ISOFS: Unable to identify CD-ROM format. 00:39:58 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x0, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:39:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x0, 0xb, 0x201, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x6, 0x1, '-\x00'}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8}]}, 0x2c}}, 0x0) [ 1211.737142][ T5257] ISOFS: Unable to identify CD-ROM format. [ 1211.759228][ T33] usb 5-1: new high-speed USB device number 22 using dummy_hcd [ 1211.766112][ T5269] nft_compat: unsupported protocol 0 [ 1211.969284][ T33] usb 5-1: device descriptor read/64, error 18 [ 1212.089324][ T33] usb usb5-port1: attempt power cycle [ 1212.119149][T23196] usb 6-1: new high-speed USB device number 26 using dummy_hcd [ 1212.319195][T23196] usb 6-1: device descriptor read/64, error 18 [ 1212.589136][T23196] usb 6-1: new high-speed USB device number 27 using dummy_hcd [ 1212.789255][T23196] usb 6-1: device descriptor read/64, error 18 [ 1212.809204][ T33] usb 5-1: new high-speed USB device number 23 using dummy_hcd [ 1212.909414][T23196] usb usb6-port1: attempt power cycle [ 1212.915026][ T33] usb 5-1: Invalid ep0 maxpacket: 0 [ 1213.069229][ T33] usb 5-1: new high-speed USB device number 24 using dummy_hcd [ 1213.159274][ T33] usb 5-1: Invalid ep0 maxpacket: 0 [ 1213.164800][ T33] usb usb5-port1: unable to enumerate USB device [ 1213.629135][T23196] usb 6-1: new high-speed USB device number 28 using dummy_hcd [ 1213.719764][T23196] usb 6-1: Invalid ep0 maxpacket: 0 00:40:00 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x0, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 00:40:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1143442, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x4d, [], 0x0, 0x0, &(0x7f0000000200)=""/77}, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 00:40:00 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:00 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "0591662de8c55342db7a6283638a3833f4ca909e1264118c30e3a087d2d4d4af97dac85cc7770e39f42dd3f9603a7e751ab8231ea3373fcab3082f05ee0368"}, 0x60, 0x0, 0x0, &(0x7f0000000200)={0x10}, 0x10}, 0x0) 00:40:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a5, 0x0) [ 1213.879160][T23196] usb 6-1: new high-speed USB device number 29 using dummy_hcd [ 1213.964861][ T5290] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1213.975602][T23196] usb 6-1: Invalid ep0 maxpacket: 0 [ 1213.982854][T23196] usb usb6-port1: unable to enumerate USB device [ 1214.078530][ T5295] batman_adv: batadv0: Adding interface: veth11 00:40:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_int(r0, 0x0, 0xa, &(0x7f00000002c0)=0xebcd, 0x4) 00:40:01 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fdinfo/3\x00') [ 1214.110401][ T5295] batman_adv: batadv0: The MTU of interface veth11 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. [ 1214.184130][ T5295] batman_adv: batadv0: Not using interface veth11 (retrying later): interface not active [ 1214.319170][ T33] usb 5-1: new high-speed USB device number 25 using dummy_hcd 00:40:01 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:01 executing program 1: r0 = socket(0x2, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)) 00:40:01 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='fd/3\x00') [ 1214.539416][ T33] usb 5-1: device descriptor read/64, error 18 00:40:01 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x0, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:01 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1214.839133][ T33] usb 5-1: new high-speed USB device number 26 using dummy_hcd [ 1215.059360][ T33] usb 5-1: device descriptor read/64, error 18 [ 1215.189383][ T33] usb usb5-port1: attempt power cycle [ 1215.209184][T23196] usb 6-1: new high-speed USB device number 30 using dummy_hcd [ 1215.429141][T23196] usb 6-1: device descriptor read/64, error 18 [ 1215.709273][T23196] usb 6-1: new high-speed USB device number 31 using dummy_hcd [ 1215.899189][ T33] usb 5-1: new high-speed USB device number 27 using dummy_hcd [ 1215.919156][T23196] usb 6-1: device descriptor read/64, error 18 [ 1216.000079][ T33] usb 5-1: Invalid ep0 maxpacket: 0 [ 1216.050194][T23196] usb usb6-port1: attempt power cycle [ 1216.169219][ T33] usb 5-1: new high-speed USB device number 28 using dummy_hcd [ 1216.269878][ T33] usb 5-1: Invalid ep0 maxpacket: 0 [ 1216.275591][ T33] usb usb5-port1: unable to enumerate USB device [ 1216.789591][T23196] usb 6-1: new high-speed USB device number 32 using dummy_hcd [ 1216.899820][T23196] usb 6-1: Invalid ep0 maxpacket: 0 00:40:03 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x0, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 00:40:03 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') 00:40:03 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r0, 0x40184152, 0x0) 00:40:03 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/pid_for_children\x00') 00:40:03 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1217.079093][T23196] usb 6-1: new high-speed USB device number 33 using dummy_hcd 00:40:04 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:04 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000140), 0x4) 00:40:04 executing program 1: syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1217.179838][T23196] usb 6-1: Invalid ep0 maxpacket: 0 [ 1217.196494][T23196] usb usb6-port1: unable to enumerate USB device 00:40:04 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 1217.332718][ T5356] ptrace attach of "/root/syz-executor.2"[5352] was attempted by "/root/syz-executor.2"[5356] [ 1217.337533][ T5355] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1217.389667][ T7] usb 5-1: new high-speed USB device number 29 using dummy_hcd [ 1217.580185][ T7] usb 5-1: device descriptor read/64, error 18 [ 1217.858825][ T7] usb 5-1: new high-speed USB device number 30 using dummy_hcd 00:40:04 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x0, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:04 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 1218.059299][ T7] usb 5-1: device descriptor read/64, error 18 [ 1218.180604][ T7] usb usb5-port1: attempt power cycle [ 1218.399447][ T33] usb 6-1: new high-speed USB device number 34 using dummy_hcd [ 1218.609140][ T33] usb 6-1: device descriptor read/64, error 18 [ 1218.889232][ T7] usb 5-1: new high-speed USB device number 31 using dummy_hcd [ 1218.903992][ T33] usb 6-1: new high-speed USB device number 35 using dummy_hcd [ 1218.979561][ T7] usb 5-1: Invalid ep0 maxpacket: 0 [ 1219.119249][ T33] usb 6-1: device descriptor read/64, error 18 [ 1219.131676][ T7] usb 5-1: new high-speed USB device number 32 using dummy_hcd [ 1219.229284][ T7] usb 5-1: Invalid ep0 maxpacket: 0 [ 1219.234728][ T7] usb usb5-port1: unable to enumerate USB device [ 1219.250996][ T33] usb usb6-port1: attempt power cycle 00:40:07 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) 00:40:07 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x60540, 0x0) 00:40:07 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:07 executing program 1: syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0}) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x700, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 1219.999176][ T33] usb 6-1: new high-speed USB device number 36 using dummy_hcd [ 1220.089735][ T33] usb 6-1: Invalid ep0 maxpacket: 0 00:40:07 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='fd/3\x00') [ 1220.153863][ T5391] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1220.249258][ T33] usb 6-1: new high-speed USB device number 37 using dummy_hcd [ 1220.360124][ T33] usb 6-1: Invalid ep0 maxpacket: 0 [ 1220.365995][ T33] usb usb6-port1: unable to enumerate USB device 00:40:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:40:07 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1220.479239][ T7] usb 5-1: new high-speed USB device number 33 using dummy_hcd 00:40:07 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000100)={'virt_wifi0\x00', @ifru_map}) [ 1220.590505][ T5408] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:07 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) clock_gettime(0x0, &(0x7f0000007900)={0x0, 0x0}) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000007940)={r1, r2+10000000}) [ 1220.749077][ T7] usb 5-1: Using ep0 maxpacket: 8 00:40:07 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1220.870066][ T7] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1220.901907][ T7] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1221.010368][ T7] usb 5-1: config 0 descriptor?? [ 1221.051558][ T7] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1221.058941][ T5423] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:08 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:08 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) [ 1221.269250][ T7] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 1221.277728][ T7] sq905c 5-1:0.0: Get version command failed [ 1221.302876][ T7] sq905c: probe of 5-1:0.0 failed with error -71 [ 1221.316015][ T7] usb 5-1: USB disconnect, device number 33 [ 1221.619066][T31013] usb 6-1: new high-speed USB device number 38 using dummy_hcd 00:40:08 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) 00:40:08 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:08 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000740)='/dev/input/mice\x00', 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, 0x0) 00:40:08 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:08 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getpeername$l2tp(r0, 0x0, 0x0) 00:40:08 executing program 1: socket(0x1d, 0x0, 0x100) [ 1221.859269][T31013] usb 6-1: Using ep0 maxpacket: 8 [ 1221.865388][ T5453] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:08 executing program 0: syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x200000) [ 1221.980242][T31013] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1222.014002][T31013] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 00:40:09 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r4, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000180)=0x6, 0x4) [ 1222.078218][T31013] usb 6-1: config 0 descriptor?? 00:40:09 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) [ 1222.160488][T31013] cp210x 6-1:0.0: cp210x converter detected [ 1222.175373][ T5474] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1222.190999][T23196] usb 5-1: new high-speed USB device number 34 using dummy_hcd [ 1222.449046][T23196] usb 5-1: Using ep0 maxpacket: 8 [ 1222.599311][T23196] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1222.607046][T31013] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1222.608739][T23196] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1222.616649][T31013] cp210x: probe of ttyUSB0 failed with error -71 [ 1222.636052][T31013] usb 6-1: USB disconnect, device number 38 [ 1222.646355][T31013] cp210x 6-1:0.0: device disconnected [ 1222.674679][T23196] usb 5-1: config 0 descriptor?? [ 1222.732007][T23196] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1222.939137][T23196] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 1222.946965][T23196] sq905c 5-1:0.0: Get version command failed [ 1222.964076][T23196] sq905c: probe of 5-1:0.0 failed with error -71 [ 1222.973978][T23196] usb 5-1: USB disconnect, device number 34 00:40:10 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:10 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 00:40:10 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xca, 0xc3, 0x64, 0x8, 0x2770, 0x9050, 0xa613, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xff, 0x5b, 0x9d}}]}}]}}, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) [ 1223.475057][T23196] usb 6-1: new high-speed USB device number 39 using dummy_hcd [ 1223.739059][T23196] usb 6-1: Using ep0 maxpacket: 8 [ 1223.789196][T12603] usb 5-1: new high-speed USB device number 35 using dummy_hcd [ 1223.879243][T23196] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1223.888473][T23196] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1223.906127][T23196] usb 6-1: config 0 descriptor?? [ 1223.960636][T23196] cp210x 6-1:0.0: cp210x converter detected [ 1224.079120][T12603] usb 5-1: Using ep0 maxpacket: 8 [ 1224.229622][T12603] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=a6.13 [ 1224.238704][T12603] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1224.263754][T12603] usb 5-1: config 0 descriptor?? [ 1224.321722][T12603] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 1224.419256][T23196] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1224.426614][T23196] cp210x: probe of ttyUSB0 failed with error -71 [ 1224.447157][T23196] usb 6-1: USB disconnect, device number 39 [ 1224.455406][T23196] cp210x 6-1:0.0: device disconnected [ 1224.533588][T12603] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 1224.545832][T12603] sq905c 5-1:0.0: Get version command failed [ 1224.562386][T12603] sq905c: probe of 5-1:0.0 failed with error -71 [ 1224.579388][T12603] usb 5-1: USB disconnect, device number 35 00:40:11 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:11 executing program 1: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000010c0)='NLBL_CALIPSO\x00') 00:40:11 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getpgid(0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:11 executing program 0: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) connect$nfc_raw(r0, 0x0, 0x0) [ 1224.847513][ T5559] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:11 executing program 0: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) connect$nfc_raw(r0, 0x0, 0x0) 00:40:11 executing program 1: syz_mount_image$hfs(&(0x7f0000001000)='hfs\x00', &(0x7f0000001040)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x1410, &(0x7f0000003400)) [ 1224.910428][ T5565] batman_adv: batadv0: Adding interface: veth21 [ 1224.932912][ T5565] batman_adv: batadv0: The MTU of interface veth21 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. 00:40:11 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1224.970268][ T5565] batman_adv: batadv0: Not using interface veth21 (retrying later): interface not active 00:40:12 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:12 executing program 4: clock_getres(0x1e44b45adcf879c4, 0x0) 00:40:12 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/143, 0x8f}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) [ 1225.160343][ T5580] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$inet(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@ip_ttl={{0x14}}], 0x18}}], 0x1, 0x0) [ 1225.241320][ T5585] batman_adv: batadv0: Adding interface: veth23 [ 1225.247724][ T5585] batman_adv: batadv0: The MTU of interface veth23 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. 00:40:12 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@ipv4={[], [], @loopback}}, 0x14) [ 1225.349284][T12603] usb 6-1: new high-speed USB device number 40 using dummy_hcd [ 1225.358303][ T5585] batman_adv: batadv0: Not using interface veth23 (retrying later): interface not active [ 1225.589165][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1225.719688][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1225.728755][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1225.749423][T12603] usb 6-1: config 0 descriptor?? [ 1225.800487][T12603] cp210x 6-1:0.0: cp210x converter detected [ 1226.249261][T12603] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1226.257182][T12603] cp210x: probe of ttyUSB0 failed with error -71 [ 1226.280358][T12603] usb 6-1: USB disconnect, device number 40 [ 1226.287599][T12603] cp210x 6-1:0.0: device disconnected 00:40:14 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:14 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:14 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6f, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b0d8b9aad0100000000000040aa2502df4d70c74f5cd30a0002a7bef7fdffff9f8b01"}}], 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 00:40:14 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') 00:40:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4, 'X_I('}, &(0x7f00000000c0)=0x28) 00:40:14 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1227.941306][ T5631] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x2}, &(0x7f0000000040)=0x20) 00:40:15 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000007400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:40:15 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_int(r0, 0x0, 0x1, 0x0, 0x0) 00:40:15 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:15 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffff, 0x2}, 0x6) [ 1228.204404][ T5657] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1228.219231][T12603] usb 6-1: new high-speed USB device number 41 using dummy_hcd 00:40:15 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 1228.469208][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1228.589992][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1228.609635][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1228.650303][T12603] usb 6-1: config 0 descriptor?? [ 1228.697619][T12603] cp210x 6-1:0.0: cp210x converter detected [ 1228.909316][T12603] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1228.917020][T12603] cp210x 6-1:0.0: querying part number failed [ 1228.959264][T12603] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1228.966337][T12603] cp210x: probe of ttyUSB0 failed with error -71 [ 1228.979718][T12603] usb 6-1: USB disconnect, device number 41 [ 1229.010076][T12603] cp210x 6-1:0.0: device disconnected 00:40:17 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:17 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x0, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) 00:40:17 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:17 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'wlan0\x00'}, 0x18) 00:40:17 executing program 1: getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000000c0)) 00:40:17 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1231.005873][ T5703] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:18 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xc, &(0x7f0000000280)="5cf249b974057c79b1c2ed44"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:18 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000600)={@multicast, @link_local, @val={@void}, {@generic={0x0, "2dcd"}}}, 0x0) [ 1231.099227][ T5706] IPVS: Error connecting to the multicast addr 00:40:18 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) [ 1231.263743][ T5727] ptrace attach of "/root/syz-executor.1"[5723] was attempted by "/root/syz-executor.1"[5727] 00:40:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) 00:40:18 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, 0x4, 0x0, 0x0, 0x0, 0xff}) [ 1231.329332][ T7] usb 6-1: new high-speed USB device number 42 using dummy_hcd [ 1231.588050][ T7] usb 6-1: Using ep0 maxpacket: 8 [ 1231.709922][ T7] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1231.732605][ T7] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1231.768434][ T7] usb 6-1: config 0 descriptor?? [ 1231.820646][ T7] cp210x 6-1:0.0: cp210x converter detected [ 1232.029241][ T7] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1232.036780][ T7] cp210x 6-1:0.0: querying part number failed [ 1232.079137][ T7] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1232.086225][ T7] cp210x: probe of ttyUSB0 failed with error -71 [ 1232.116590][ T7] usb 6-1: USB disconnect, device number 42 [ 1232.128096][ T7] cp210x 6-1:0.0: device disconnected 00:40:20 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000004080)={0x0, 0x0, &(0x7f0000004040)={&(0x7f0000003b80)=ANY=[@ANYBLOB="bc"], 0x4bc}}, 0x0) 00:40:20 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:20 executing program 4: r0 = socket(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, 0x0) 00:40:20 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) recvfrom$l2tp(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 00:40:20 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7edad9c0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c0000000206050000000000000000000000000014000300686173683a58702c706f72742c69700005000400000000000900020073797a3000000000050005000a0000000500010006000000"], 0x4c}}, 0x0) 00:40:21 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:21 executing program 0: syz_mount_image$sysv(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, 0x0) 00:40:21 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:21 executing program 0: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f00000073c0)={&(0x7f0000000240)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000035c0)=[{0x0}, {&(0x7f0000000380)=""/4096, 0x1000}, {0x0}, {0x0}], 0x4, &(0x7f0000007100)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}, @zcopy_cookie={0x18}], 0x60, 0x40891}, 0x0) [ 1234.359085][T31013] usb 6-1: new high-speed USB device number 43 using dummy_hcd [ 1234.382874][ T5785] Can't find ip_set type hash:Xp,port,ip 00:40:21 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000000)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) [ 1234.470357][ T5788] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1234.609185][T31013] usb 6-1: Using ep0 maxpacket: 8 [ 1234.755632][T31013] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1234.770570][T31013] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1234.807224][T31013] usb 6-1: config 0 descriptor?? [ 1234.870705][T31013] cp210x 6-1:0.0: cp210x converter detected [ 1235.099285][T31013] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1235.106820][T31013] cp210x 6-1:0.0: querying part number failed [ 1235.169150][T31013] cp210x ttyUSB0: failed get req 0x4 size 2 status: -71 [ 1235.176903][T31013] cp210x: probe of ttyUSB0 failed with error -71 [ 1235.206881][T31013] usb 6-1: USB disconnect, device number 43 [ 1235.221484][T31013] cp210x 6-1:0.0: device disconnected 00:40:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={'bond0\x00', 0x8, 0x7a9}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0x4000015) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100425bd7000ffdbdf25550000000c00990000000a015d0000005a2e32d05c3d0c39ef0100000000000000fbb51a0d87b39807126ecbf0da9694eb30702f6f8a3ca52ce054cdbb9401a547dad7b1ca7b9c86fbb58802e7e00c300febc6b4a575f93a8e4fc34b1812cd1553f6cf49b5"], 0x20}, 0x1, 0x0, 0x0, 0x4000084}, 0x24008004) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200036150, 0x800007c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000003c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:40:24 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x34}}, 0x0) 00:40:24 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:24 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, 0x0) 00:40:24 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:24 executing program 1: socket$l2tp(0x2, 0x2, 0x73) openat$vsock(0xffffffffffffff9c, &(0x7f0000002440)='/dev/vsock\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000020c0)='fd/4\x00') [ 1237.254717][ T5833] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:24 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:24 executing program 0: openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x101001) [ 1237.377856][ T5847] NFS: Device name not specified 00:40:24 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 00:40:24 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) [ 1237.480544][ T5854] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1237.519290][ T33] usb 6-1: new high-speed USB device number 44 using dummy_hcd 00:40:24 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) accept4$tipc(r0, 0x0, 0x0, 0x0) 00:40:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1237.769530][ T33] usb 6-1: Using ep0 maxpacket: 8 [ 1237.778645][ T5872] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1237.825985][ T5872] batman_adv: batadv0: Adding interface: veth31 [ 1237.842042][ T5872] batman_adv: batadv0: The MTU of interface veth31 is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. [ 1237.870485][ T5872] batman_adv: batadv0: Not using interface veth31 (retrying later): interface not active [ 1237.909233][ T33] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1237.923145][ T33] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1237.958207][ T33] usb 6-1: config 0 descriptor?? [ 1238.040379][ T33] cp210x 6-1:0.0: cp210x converter detected [ 1238.249220][ T33] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1238.256741][ T33] cp210x 6-1:0.0: querying part number failed [ 1238.309195][ T33] cp210x ttyUSB0: failed get req 0x4 size 2 status: -32 [ 1238.316280][ T33] cp210x: probe of ttyUSB0 failed with error -32 [ 1240.201202][ T33] usb 6-1: USB disconnect, device number 44 [ 1240.208119][ T33] cp210x 6-1:0.0: device disconnected 00:40:27 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x40, 0x4) 00:40:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x17, 0x0, 0x0) 00:40:27 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg$nfc_llcp(r0, 0x0, 0x0, 0x0) 00:40:27 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:27 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x321101) [ 1240.391904][ T5911] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:27 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='fd/3\x00') mmap$snddsp_control(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x83000000) 00:40:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x41) 00:40:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:27 executing program 0: syz_mount_image$hfsplus(&(0x7f0000008b00)='hfsplus\x00', &(0x7f0000008b40)='./file0\x00', 0x0, 0x0, &(0x7f0000008e00), 0x0, &(0x7f0000008e80)={[{@session={'session'}}, {@nls={'nls', 0x3d, 'iso8859-15'}}]}) 00:40:27 executing program 4: syz_open_procfs(0x0, &(0x7f0000005b80)='net/snmp\x00') 00:40:27 executing program 1: socketpair(0x2b, 0x1, 0x9, 0x0) [ 1240.731828][ T5933] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1240.749186][ T33] usb 6-1: new high-speed USB device number 45 using dummy_hcd [ 1240.780975][ T5935] hfsplus: unable to find HFS+ superblock 00:40:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}, 0x0) 00:40:27 executing program 4: futex(&(0x7f0000000040), 0x8b, 0x0, 0x0, &(0x7f0000000080), 0x0) [ 1240.847526][ T5935] hfsplus: unable to find HFS+ superblock [ 1240.999164][ T33] usb 6-1: Using ep0 maxpacket: 8 [ 1241.119331][ T33] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1241.131649][ T33] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1241.155259][ T33] usb 6-1: config 0 descriptor?? [ 1241.210415][ T33] cp210x 6-1:0.0: cp210x converter detected [ 1241.429149][ T33] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1241.436663][ T33] cp210x 6-1:0.0: querying part number failed [ 1241.519243][ T33] cp210x ttyUSB0: failed get req 0x4 size 2 status: -32 [ 1241.526313][ T33] cp210x: probe of ttyUSB0 failed with error -32 [ 1243.318777][T31013] usb 6-1: USB disconnect, device number 45 [ 1243.326167][T31013] cp210x 6-1:0.0: device disconnected 00:40:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:30 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000040)) 00:40:30 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x7, &(0x7f0000002300)={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 00:40:30 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x80c) 00:40:30 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:30 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 00:40:30 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000080)={'team_slave_0\x00', @ifru_data=0x0}) 00:40:30 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @private}, {0xc, @random="fb92e9b1967f"}, 0x2a, {0x2, 0x0, @loopback}, 'ip6gre0\x00'}) [ 1243.561799][ T5990] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:30 executing program 1: io_setup(0x800, &(0x7f0000000040)=0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_getevents(r0, 0xfffffffffffffffb, 0x0, 0x0, 0x0) 00:40:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:30 executing program 4: creat(&(0x7f0000002cc0)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001f40)='net/udp\x00') r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000002440)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='9p\x00', 0x0, &(0x7f0000002480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}]}}) [ 1243.893981][ T6016] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1243.909116][T31013] usb 6-1: new high-speed USB device number 46 using dummy_hcd [ 1243.920669][ T34] audit: type=1804 audit(1605832830.879:5201): pid=6017 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir104133665/syzkaller.AhK4BS/1632/file0" dev="sda1" ino=16381 res=1 errno=0 [ 1244.013620][ T34] audit: type=1804 audit(1605832830.889:5202): pid=6018 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir104133665/syzkaller.AhK4BS/1632/file0" dev="sda1" ino=16381 res=1 errno=0 [ 1244.159187][T31013] usb 6-1: Using ep0 maxpacket: 8 [ 1244.279967][T31013] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1244.294044][T31013] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1244.315885][T31013] usb 6-1: config 0 descriptor?? [ 1244.360414][T31013] cp210x 6-1:0.0: cp210x converter detected [ 1244.579129][T31013] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1244.586687][T31013] cp210x 6-1:0.0: querying part number failed [ 1244.629292][T31013] cp210x ttyUSB0: failed get req 0x4 size 2 status: -32 [ 1244.636323][T31013] cp210x: probe of ttyUSB0 failed with error -32 [ 1246.447037][T31013] usb 6-1: USB disconnect, device number 46 [ 1246.454217][T31013] cp210x 6-1:0.0: device disconnected 00:40:33 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:33 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000080)={{0x11, @dev, 0x0, 0x0, 'dh\x00'}, {@multicast1}}, 0x44) 00:40:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000043c0)='/dev/zero\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 00:40:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x50}}, 0x0) 00:40:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:33 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1246.595045][ T6050] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:33 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 00:40:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg$inet(r0, &(0x7f0000004e00)=[{{&(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x1, 0x0) 00:40:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:33 executing program 0: 00:40:33 executing program 4: [ 1246.936129][ T6072] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1246.979287][T31013] usb 6-1: new high-speed USB device number 47 using dummy_hcd [ 1247.229060][T31013] usb 6-1: Using ep0 maxpacket: 8 [ 1247.349750][T31013] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1247.358833][T31013] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1247.379467][T31013] usb 6-1: config 0 descriptor?? [ 1247.427926][T31013] cp210x 6-1:0.0: cp210x converter detected [ 1247.639247][T31013] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1247.646805][T31013] cp210x 6-1:0.0: querying part number failed [ 1247.719136][T31013] cp210x ttyUSB0: failed get req 0x4 size 2 status: -32 [ 1247.726742][T31013] cp210x: probe of ttyUSB0 failed with error -32 [ 1249.564462][T23194] usb 6-1: USB disconnect, device number 47 [ 1249.571649][T23194] cp210x 6-1:0.0: device disconnected 00:40:36 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:36 executing program 4: 00:40:36 executing program 0: 00:40:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:36 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1249.736655][ T6110] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:36 executing program 0: 00:40:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:36 executing program 4: 00:40:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:36 executing program 0: 00:40:36 executing program 4: [ 1250.069523][ T6127] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1250.159120][T23194] usb 6-1: new high-speed USB device number 48 using dummy_hcd [ 1250.419038][T23194] usb 6-1: Using ep0 maxpacket: 8 [ 1250.539245][T23194] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1250.548338][T23194] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1250.577496][T23194] usb 6-1: config 0 descriptor?? [ 1250.640630][T23194] cp210x 6-1:0.0: cp210x converter detected [ 1250.859147][T23194] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1250.866755][T23194] cp210x 6-1:0.0: querying part number failed [ 1250.939203][T23194] cp210x ttyUSB0: failed get req 0x4 size 2 status: -32 [ 1250.946354][T23194] cp210x: probe of ttyUSB0 failed with error -32 [ 1252.701449][ T7] usb 6-1: USB disconnect, device number 48 [ 1252.708325][ T7] cp210x 6-1:0.0: device disconnected 00:40:39 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:39 executing program 0: 00:40:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:39 executing program 4: 00:40:39 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:39 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:39 executing program 4: [ 1252.925237][ T6167] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:39 executing program 0: 00:40:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:40 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:40 executing program 4: [ 1253.158197][ T6187] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1253.279056][ T7] usb 6-1: new high-speed USB device number 49 using dummy_hcd [ 1253.519145][ T7] usb 6-1: Using ep0 maxpacket: 8 [ 1253.639172][ T7] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1253.648266][ T7] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1253.676036][ T7] usb 6-1: config 0 descriptor?? [ 1253.720556][ T7] cp210x 6-1:0.0: cp210x converter detected [ 1253.939086][ T7] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1253.946592][ T7] cp210x 6-1:0.0: querying part number failed [ 1253.989324][ T7] cp210x ttyUSB0: failed get req 0x4 size 2 status: -32 [ 1253.996515][ T7] cp210x: probe of ttyUSB0 failed with error -32 [ 1255.846788][T23194] usb 6-1: USB disconnect, device number 49 [ 1255.854135][T23194] cp210x 6-1:0.0: device disconnected 00:40:42 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:42 executing program 0: 00:40:42 executing program 4: 00:40:42 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:42 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:43 executing program 4: [ 1255.999540][ T6225] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:43 executing program 0: 00:40:43 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:43 executing program 4: 00:40:43 executing program 0: [ 1256.300560][ T6243] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1256.389065][T23194] usb 6-1: new high-speed USB device number 50 using dummy_hcd [ 1256.639076][T23194] usb 6-1: Using ep0 maxpacket: 8 [ 1256.779883][T23194] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1256.789287][T23194] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1256.798890][T23194] usb 6-1: config 0 descriptor?? [ 1256.850631][T23194] cp210x 6-1:0.0: cp210x converter detected [ 1257.059195][T23194] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1257.066706][T23194] cp210x 6-1:0.0: querying part number failed [ 1257.119227][T23194] cp210x ttyUSB0: failed get req 0x4 size 2 status: 0 [ 1257.126249][T23194] cp210x: probe of ttyUSB0 failed with error -5 [ 1258.958874][T12603] usb 6-1: USB disconnect, device number 50 [ 1258.966060][T12603] cp210x 6-1:0.0: device disconnected 00:40:46 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:46 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:46 executing program 4: 00:40:46 executing program 0: 00:40:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:46 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:46 executing program 4: 00:40:46 executing program 0: [ 1259.136372][ T6281] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:46 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:46 executing program 0: 00:40:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:46 executing program 4: [ 1259.462848][ T6301] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1259.489287][T12603] usb 6-1: new high-speed USB device number 51 using dummy_hcd [ 1259.729132][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1259.858791][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1259.879359][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1259.900492][T12603] usb 6-1: config 0 descriptor?? [ 1259.950926][T12603] cp210x 6-1:0.0: cp210x converter detected [ 1260.169123][T12603] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1260.176636][T12603] cp210x 6-1:0.0: querying part number failed [ 1260.239431][T12603] cp210x ttyUSB0: failed get req 0x4 size 2 status: 0 [ 1260.246338][T12603] cp210x: probe of ttyUSB0 failed with error -5 [ 1262.084448][ T3001] usb 6-1: USB disconnect, device number 51 [ 1262.092194][ T3001] cp210x 6-1:0.0: device disconnected 00:40:49 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:49 executing program 0: 00:40:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 00:40:49 executing program 4: 00:40:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:49 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 1262.228751][ T6336] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:49 executing program 0: 00:40:49 executing program 4: 00:40:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 00:40:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 00:40:49 executing program 0: [ 1262.507964][ T6354] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1262.629251][ T3001] usb 6-1: new high-speed USB device number 52 using dummy_hcd [ 1262.879166][ T3001] usb 6-1: Using ep0 maxpacket: 8 [ 1262.999153][ T3001] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1263.016393][ T3001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1263.050354][ T3001] usb 6-1: config 0 descriptor?? [ 1263.090576][ T3001] cp210x 6-1:0.0: cp210x converter detected [ 1263.299259][ T3001] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1263.306776][ T3001] cp210x 6-1:0.0: querying part number failed [ 1263.380539][ T3001] cp210x ttyUSB0: failed get req 0x4 size 2 status: 0 [ 1263.387386][ T3001] cp210x: probe of ttyUSB0 failed with error -5 [ 1265.194217][T31013] usb 6-1: USB disconnect, device number 52 [ 1265.201426][T31013] cp210x 6-1:0.0: device disconnected 00:40:52 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:52 executing program 4: 00:40:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 00:40:52 executing program 0: 00:40:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:52 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000480)={0x0, 0x0, 0x1, "10"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:52 executing program 0: [ 1265.372770][ T6396] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:52 executing program 4: 00:40:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 00:40:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:52 executing program 0: 00:40:52 executing program 4: [ 1265.676548][ T6414] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1265.769147][T31013] usb 6-1: new high-speed USB device number 53 using dummy_hcd [ 1266.026142][T31013] usb 6-1: Using ep0 maxpacket: 8 [ 1266.149263][T31013] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1266.158369][T31013] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1266.176390][T31013] usb 6-1: config 0 descriptor?? [ 1266.220423][T31013] cp210x 6-1:0.0: cp210x converter detected [ 1266.439112][T31013] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1266.446599][T31013] cp210x 6-1:0.0: querying part number failed [ 1266.489471][T31013] cp210x ttyUSB0: failed get req 0x4 size 2 status: 1 [ 1266.496445][T31013] cp210x: probe of ttyUSB0 failed with error -5 [ 1268.308899][ T3194] usb 6-1: USB disconnect, device number 53 [ 1268.329529][ T3194] cp210x 6-1:0.0: device disconnected 00:40:55 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 00:40:55 executing program 0: 00:40:55 executing program 4: 00:40:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:55 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000480)={0x0, 0x0, 0x1, "10"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:40:55 executing program 4: [ 1268.511660][ T6454] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:55 executing program 0: 00:40:55 executing program 4: 00:40:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 1268.867522][ T6475] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1268.909071][ T3194] usb 6-1: new high-speed USB device number 54 using dummy_hcd [ 1269.170764][ T3194] usb 6-1: Using ep0 maxpacket: 8 [ 1269.299939][ T3194] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1269.309118][ T3194] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1269.330061][ T3194] usb 6-1: config 0 descriptor?? [ 1269.380369][ T3194] cp210x 6-1:0.0: cp210x converter detected [ 1269.599223][ T3194] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1269.606908][ T3194] cp210x 6-1:0.0: querying part number failed [ 1269.679399][ T3194] cp210x ttyUSB0: failed get req 0x4 size 2 status: 1 [ 1269.686249][ T3194] cp210x: probe of ttyUSB0 failed with error -5 [ 1271.437183][ T33] usb 6-1: USB disconnect, device number 54 [ 1271.453735][ T33] cp210x 6-1:0.0: device disconnected 00:40:58 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:40:58 executing program 0: 00:40:58 executing program 4: 00:40:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:40:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:58 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000480)={0x0, 0x0, 0x1, "10"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 00:40:58 executing program 4: [ 1271.608726][ T6509] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:58 executing program 0: 00:40:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:40:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:40:58 executing program 0: 00:40:58 executing program 4: [ 1271.953772][ T6531] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1271.999155][ T33] usb 6-1: new high-speed USB device number 55 using dummy_hcd [ 1272.269291][ T33] usb 6-1: Using ep0 maxpacket: 8 [ 1272.410136][ T33] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1272.419775][ T33] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1272.443156][ T33] usb 6-1: config 0 descriptor?? [ 1272.490623][ T33] cp210x 6-1:0.0: cp210x converter detected [ 1272.699162][ T33] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1272.706831][ T33] cp210x 6-1:0.0: querying part number failed [ 1272.769447][ T33] cp210x ttyUSB0: failed get req 0x4 size 2 status: 1 [ 1272.776461][ T33] cp210x: probe of ttyUSB0 failed with error -5 [ 1274.569414][T12603] usb 6-1: USB disconnect, device number 55 [ 1274.576303][T12603] cp210x 6-1:0.0: device disconnected 00:41:01 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:41:01 executing program 4: 00:41:01 executing program 0: 00:41:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:01 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 00:41:01 executing program 4: [ 1274.742502][ T6568] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:01 executing program 0: 00:41:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 00:41:01 executing program 4: 00:41:01 executing program 0: 00:41:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1275.109384][ T6589] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1275.121710][T12603] usb 6-1: new high-speed USB device number 56 using dummy_hcd [ 1275.375523][T12603] usb 6-1: Using ep0 maxpacket: 8 [ 1275.509242][T12603] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1275.518848][T12603] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1275.543463][T12603] usb 6-1: config 0 descriptor?? [ 1275.580544][T12603] cp210x 6-1:0.0: cp210x converter detected [ 1275.799122][T12603] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1275.806743][T12603] cp210x 6-1:0.0: querying part number failed [ 1276.079109][T12603] cp210x ttyUSB0: failed set request 0x3 status: -71 [ 1276.085907][T12603] cp210x: probe of ttyUSB0 failed with error -71 [ 1276.115624][T12603] usb 6-1: USB disconnect, device number 56 [ 1276.128829][T12603] cp210x 6-1:0.0: device disconnected 00:41:04 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 00:41:04 executing program 4: 00:41:04 executing program 0: 00:41:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:04 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 00:41:04 executing program 0: 00:41:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:04 executing program 4: 00:41:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 00:41:04 executing program 0: 00:41:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1278.129332][ T3001] usb 6-1: new high-speed USB device number 57 using dummy_hcd [ 1278.379056][ T3001] usb 6-1: Using ep0 maxpacket: 8 [ 1278.499842][ T3001] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1278.508932][ T3001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1278.530093][ T3001] usb 6-1: config 0 descriptor?? [ 1278.590449][ T3001] cp210x 6-1:0.0: cp210x converter detected [ 1278.809269][ T3001] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1278.816809][ T3001] cp210x 6-1:0.0: querying part number failed [ 1279.099280][ T3001] cp210x ttyUSB0: failed set request 0x3 status: -71 [ 1279.107128][ T3001] cp210x: probe of ttyUSB0 failed with error -71 [ 1279.131896][ T3001] usb 6-1: USB disconnect, device number 57 [ 1279.149617][ T3001] cp210x 6-1:0.0: device disconnected 00:41:07 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:07 executing program 4: 00:41:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 00:41:07 executing program 0: 00:41:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:07 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3d, 0x60, 0xb3, 0x8, 0x1fb9, 0x201, 0xc07e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x21, 0x8b, 0x48}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x18, &(0x7f0000000480)={0x0, 0x0, 0x2, "100d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 00:41:07 executing program 0: 00:41:07 executing program 4: 00:41:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 00:41:08 executing program 0: 00:41:08 executing program 4: [ 1281.219154][ T7] usb 6-1: new high-speed USB device number 58 using dummy_hcd [ 1281.469118][ T7] usb 6-1: Using ep0 maxpacket: 8 [ 1281.593643][ T7] usb 6-1: New USB device found, idVendor=1fb9, idProduct=0201, bcdDevice=c0.7e [ 1281.608851][ T7] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1281.667156][ T7] usb 6-1: config 0 descriptor?? [ 1281.730816][ T7] cp210x 6-1:0.0: cp210x converter detected [ 1281.949176][ T7] cp210x 6-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 1281.956869][ T7] cp210x 6-1:0.0: querying part number failed [ 1282.209184][ T7] cp210x ttyUSB0: failed set request 0x3 status: -71 [ 1282.215994][ T7] cp210x: probe of ttyUSB0 failed with error -71 [ 1282.246406][ T7] usb 6-1: USB disconnect, device number 58 [ 1282.253693][ T7] cp210x 6-1:0.0: device disconnected 00:41:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:10 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:10 executing program 5: 00:41:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:41:10 executing program 0: 00:41:10 executing program 4: 00:41:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:41:11 executing program 5: 00:41:11 executing program 4: 00:41:11 executing program 0: 00:41:11 executing program 5: 00:41:11 executing program 4: 00:41:14 executing program 0: 00:41:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:41:14 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:14 executing program 5: 00:41:14 executing program 4: 00:41:14 executing program 5: 00:41:14 executing program 4: 00:41:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 00:41:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:14 executing program 0: 00:41:14 executing program 5: 00:41:14 executing program 0: 00:41:14 executing program 4: 00:41:17 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 00:41:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:17 executing program 5: 00:41:17 executing program 4: 00:41:17 executing program 0: 00:41:17 executing program 0: 00:41:17 executing program 4: 00:41:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 00:41:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:17 executing program 5: 00:41:17 executing program 4: 00:41:20 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:20 executing program 0: 00:41:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:20 executing program 5: 00:41:20 executing program 4: 00:41:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x40}}, 0x0) 00:41:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x40}}, 0x0) 00:41:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:20 executing program 4: 00:41:20 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:20 executing program 5: 00:41:20 executing program 0: 00:41:20 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x40}}, 0x0) [ 1293.554851][ T6838] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:20 executing program 4: 00:41:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:20 executing program 0: 00:41:20 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:20 executing program 5: 00:41:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 1293.797441][ T6850] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:20 executing program 4: 00:41:20 executing program 0: 00:41:20 executing program 5: 00:41:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:41:21 executing program 4: [ 1294.061825][ T6864] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:21 executing program 0: 00:41:21 executing program 5: 00:41:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:41:23 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:23 executing program 4: 00:41:23 executing program 0: 00:41:23 executing program 5: 00:41:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x38, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x38}}, 0x0) [ 1296.817273][ T6888] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:23 executing program 5: 00:41:23 executing program 0: 00:41:23 executing program 4: 00:41:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x38, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x38}}, 0x0) 00:41:24 executing program 5: [ 1297.075108][ T6900] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:26 executing program 4: 00:41:26 executing program 0: 00:41:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x38, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x38}}, 0x0) 00:41:26 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:26 executing program 5: 00:41:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1299.913663][ T6921] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:26 executing program 4: 00:41:26 executing program 0: 00:41:26 executing program 5: 00:41:27 executing program 1: 00:41:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00'], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:27 executing program 0: 00:41:27 executing program 4: 00:41:27 executing program 5: 00:41:27 executing program 1: 00:41:29 executing program 5: 00:41:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00'], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:29 executing program 4: 00:41:29 executing program 0: 00:41:29 executing program 1: 00:41:30 executing program 5: 00:41:30 executing program 4: 00:41:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:30 executing program 0: 00:41:30 executing program 1: 00:41:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00'], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:30 executing program 4: 00:41:30 executing program 5: 00:41:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 00:41:30 executing program 1: 00:41:30 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/143, 0x8f}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 00:41:30 executing program 4: 00:41:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:30 executing program 5: 00:41:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 00:41:30 executing program 1: 00:41:30 executing program 4: 00:41:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 00:41:30 executing program 5: [ 1303.747109][ T6989] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:30 executing program 0: 00:41:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:30 executing program 1: 00:41:30 executing program 4: [ 1303.925040][ T6998] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:30 executing program 5: 00:41:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:31 executing program 0: 00:41:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:31 executing program 1: 00:41:31 executing program 5: 00:41:31 executing program 4: 00:41:31 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:31 executing program 1: [ 1304.255174][ T7012] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:31 executing program 0: 00:41:31 executing program 5: 00:41:31 executing program 4: 00:41:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:31 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:31 executing program 1: 00:41:31 executing program 0: [ 1304.585121][ T7024] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:31 executing program 4: 00:41:31 executing program 5: 00:41:31 executing program 0: 00:41:31 executing program 1: 00:41:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:31 executing program 2: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:41:31 executing program 5: 00:41:31 executing program 4: [ 1304.972201][ T7039] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:32 executing program 0: 00:41:32 executing program 1: [ 1305.057255][ T7047] ptrace attach of "/root/syz-executor.2"[7043] was attempted by "/root/syz-executor.2"[7047] 00:41:32 executing program 2: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:41:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:32 executing program 4: 00:41:32 executing program 5: 00:41:32 executing program 0: 00:41:32 executing program 1: [ 1305.378050][ T7056] ptrace attach of "/root/syz-executor.2"[7055] was attempted by "/root/syz-executor.2"[7056] [ 1305.399857][ T7058] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:32 executing program 5: 00:41:32 executing program 2: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:41:32 executing program 4: 00:41:32 executing program 1: 00:41:32 executing program 0: 00:41:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1305.681553][ T7068] ptrace attach of "/root/syz-executor.2"[7067] was attempted by "/root/syz-executor.2"[7068] 00:41:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:41:32 executing program 4: 00:41:32 executing program 5: [ 1305.819246][ T7074] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:32 executing program 0: 00:41:32 executing program 1: [ 1305.946648][ T7081] ptrace attach of "/root/syz-executor.2"[7080] was attempted by "/root/syz-executor.2"[7081] 00:41:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:41:33 executing program 5: 00:41:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:33 executing program 4: 00:41:33 executing program 0: 00:41:33 executing program 1: 00:41:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1306.222927][ T7091] ptrace attach of "/root/syz-executor.2"[7089] was attempted by "/root/syz-executor.2"[7091] [ 1306.248907][ T7092] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:33 executing program 5: 00:41:33 executing program 4: 00:41:33 executing program 1: 00:41:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:33 executing program 0: [ 1306.457214][ T7101] ptrace attach of "/root/syz-executor.2"[7100] was attempted by "/root/syz-executor.2"[7101] 00:41:33 executing program 2: gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:41:33 executing program 5: 00:41:33 executing program 4: [ 1306.669040][ T7109] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:33 executing program 0: 00:41:33 executing program 1: [ 1306.720116][ T7112] ptrace attach of "/root/syz-executor.2"[7111] was attempted by "/root/syz-executor.2"[7112] 00:41:33 executing program 2: gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:41:33 executing program 5: 00:41:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:33 executing program 4: 00:41:33 executing program 0: 00:41:33 executing program 1: [ 1306.946691][ T7123] ptrace attach of "/root/syz-executor.2"[7121] was attempted by "/root/syz-executor.2"[7123] 00:41:33 executing program 2: gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:41:34 executing program 5: [ 1307.067494][ T7127] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:34 executing program 4: 00:41:34 executing program 1: 00:41:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:34 executing program 0: [ 1307.195331][ T7133] ptrace attach of "/root/syz-executor.2"[7132] was attempted by "/root/syz-executor.2"[7133] 00:41:34 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:34 executing program 5: 00:41:34 executing program 1: 00:41:34 executing program 4: [ 1307.356248][ T7141] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:34 executing program 0: 00:41:34 executing program 5: 00:41:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:34 executing program 4: 00:41:34 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:34 executing program 1: 00:41:34 executing program 0: 00:41:34 executing program 5: [ 1307.689367][ T7154] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:34 executing program 4: 00:41:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:34 executing program 1: 00:41:34 executing program 0: 00:41:34 executing program 5: r0 = socket(0x2a, 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f00000004c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0}}, 0x0) 00:41:34 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:34 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 00:41:35 executing program 1: [ 1307.987982][ T7166] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:35 executing program 5: 00:41:35 executing program 0: 00:41:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:35 executing program 4: 00:41:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xc}, 0x40) 00:41:35 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:35 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x140d, 0x1}, 0x10}}, 0x0) [ 1308.366181][ T7189] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8980, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:41:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8910, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:41:35 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:35 executing program 1: select(0x300, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x2710}) 00:41:35 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:35 executing program 5: r0 = socket(0x21, 0x2, 0x2) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000480)={0x0}}, 0x0) 00:41:35 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000180)={@broadcast, @dev, @val, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @local}, {0x0, 0x0, 0x8}}}}}, 0x0) 00:41:35 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x1, @dev}, 0x6, {0x2, 0x0, @multicast1}, 'wlan1\x00'}) 00:41:35 executing program 4: r0 = socket(0x21, 0x2, 0x2) sendmmsg$unix(r0, &(0x7f0000005040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=ANY=[], 0xf}], 0x1, 0x0) 00:41:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000009067df"], 0x34}}, 0x0) 00:41:35 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x8927, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:41:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, 0x0, 0x5, 0x201}, 0x14}}, 0x0) 00:41:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:35 executing program 1: socket$inet6_dccp(0xa, 0x6, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, &(0x7f0000000100), 0x0) 00:41:36 executing program 5: syz_emit_ethernet(0x86, &(0x7f0000000300)=ANY=[@ANYBLOB="bcccfb3799fbbbbbbbbbbbbb080045"], 0x0) 00:41:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000280)={'ip_vti0\x00', 0x0}) 00:41:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@generic]}, 0x14}}, 0x0) 00:41:38 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x1c, 0x0, 0xb, 0x401, 0x0, 0x0, {}, [@typed={0x8, 0x1, 0x0, 0x0, @ipv4=@empty}]}, 0x1c}}, 0x0) 00:41:38 executing program 5: socket(0x21, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x0, 0xb, 0x201, 0x0, 0x0, {}, [@generic]}, 0x14}, 0x1, 0x0, 0x0, 0x10004094}, 0x4000400) socket$nl_route(0x10, 0x3, 0x0) 00:41:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x2c, r1, 0x123, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x18, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}, 0x2c}}, 0x0) 00:41:38 executing program 4: pipe(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000200)={0x0, 0x46, &(0x7f00000001c0)={&(0x7f0000000340)={0x2c, r1, 0x123, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x0, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}, 0x2c}}, 0x0) [ 1311.948182][ T7268] __nla_validate_parse: 1 callbacks suppressed [ 1311.948219][ T7268] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:41:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[], 0x14}}, 0x0) 00:41:39 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0xc, 0x0, 0x0) 00:41:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89a1, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:41:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000003440)={0x15, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 00:41:39 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x41ac00, 0x0) 00:41:41 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x7, 0x8b, &(0x7f00000000c0)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:41:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000009000000000000000400000d"], &(0x7f00000001c0)=""/128, 0x4d, 0x80, 0x1}, 0x20) 00:41:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x41, 0x0) 00:41:41 executing program 0: socket(0x18, 0x0, 0x5) 00:41:42 executing program 0: socket(0x21, 0x2, 0x2) 00:41:42 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @btf_id, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @func]}, &(0x7f0000000000)='GPL\x00', 0x1, 0xb2, &(0x7f0000000100)=""/178, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:41:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002ac0)={0x9, 0x100, 0x8, 0x4, 0x0, 0x1}, 0x40) 00:41:42 executing program 1: syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000007600)={0x0, 0x0, &(0x7f00000075c0)={&(0x7f0000007540)={0x14}, 0x14}}, 0x0) socket(0x2, 0xa, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) 00:41:42 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000005700)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffefff, 0x4080}], 0x2, 0x0) 00:41:45 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:45 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000040), 0x18) 00:41:45 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x8924, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:41:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f0000000280)={'ip_vti0\x00', 0x0}) 00:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x0, 0x3, &(0x7f0000001200)=@raw=[@generic, @generic, @call], &(0x7f0000001240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x86) [ 1318.164558][ T7348] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x18, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4}]}, &(0x7f0000001240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:41:45 executing program 5: r0 = socket(0x18, 0x0, 0x1) getsockopt$nfc_llcp(r0, 0x11, 0x0, 0x0, 0x0) 00:41:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x11, 0x5, &(0x7f0000000100)=@framed={{}, [@btf_id]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 00:41:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:45 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, 0x0, 0x0) 00:41:45 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1318.466634][ T7367] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1318.512475][ T7370] RDS: rds_bind could not find a transport for ::ffff:172.30.0.6, load rds_tcp or rds_rdma? [ 1318.556646][ T7370] RDS: rds_bind could not find a transport for ::ffff:172.30.0.6, load rds_tcp or rds_rdma? 00:41:48 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg$alg(r0, &(0x7f0000004140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18}, @assoc={0x18}], 0x5000}], 0x1, 0x0) 00:41:48 executing program 0: bpf$MAP_CREATE(0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 00:41:48 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x4040080) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[], 0x7ffff000}}, 0x0) 00:41:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:48 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) [ 1321.276586][ T7389] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:48 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xc7f2b2de371919be, 0x0, 0x0}, 0x20) 00:41:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x2, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:41:48 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={0x0, 0x34000}}, 0x0) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) [ 1321.502317][ T7402] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:48 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40000, 0x0) [ 1321.688933][ T7411] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:51 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:51 executing program 4: socket$xdp(0x2c, 0x3, 0x0) pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340)={0x9}, 0x0, 0x0, 0x0) 00:41:51 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1406, 0x1}, 0x10}}, 0x0) 00:41:51 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg2\x00'}) 00:41:51 executing program 1: r0 = socket(0x21, 0x2, 0x2) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:41:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1324.380628][ T7428] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:51 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c}}, 0x0) 00:41:51 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000005700)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4080}], 0x2, 0x0) 00:41:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89a0, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 00:41:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x2000, 0x0) 00:41:51 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1324.663594][ T7446] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:54 executing program 4: 00:41:54 executing program 0: 00:41:54 executing program 5: 00:41:54 executing program 1: 00:41:54 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:54 executing program 4: 00:41:54 executing program 5: [ 1327.526648][ T7470] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:54 executing program 1: 00:41:54 executing program 0: 00:41:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:54 executing program 5: 00:41:54 executing program 4: 00:41:54 executing program 0: [ 1327.748408][ T7480] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:54 executing program 1: 00:41:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1327.995114][ T7487] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:57 executing program 4: 00:41:57 executing program 5: 00:41:57 executing program 1: 00:41:57 executing program 0: 00:41:57 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:41:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:57 executing program 4: 00:41:57 executing program 0: [ 1330.640711][ T7505] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:41:57 executing program 5: 00:41:57 executing program 1: 00:41:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:41:57 executing program 4: 00:41:57 executing program 0: 00:41:57 executing program 5: 00:41:57 executing program 1: [ 1330.917194][ T7516] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:00 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:00 executing program 4: 00:42:00 executing program 1: 00:42:00 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:00 executing program 5: 00:42:00 executing program 0: 00:42:00 executing program 4: [ 1333.691090][ T7536] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:00 executing program 1: 00:42:00 executing program 5: 00:42:00 executing program 0: 00:42:00 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:00 executing program 1: [ 1333.993437][ T7552] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:03 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:03 executing program 4: 00:42:03 executing program 0: 00:42:03 executing program 5: 00:42:03 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:03 executing program 1: 00:42:03 executing program 4: [ 1336.835890][ T7575] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:03 executing program 0: 00:42:03 executing program 1: 00:42:03 executing program 5: 00:42:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:42:04 executing program 0: [ 1337.142179][ T7591] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:06 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:06 executing program 5: openat$autofs(0xffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x510083, 0x0) 00:42:06 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000004880)='net/nf_conntrack_expect\x00') bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 00:42:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1, 0x5000500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400000000}, 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000003740)='SMC_PNETID\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 00:42:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @local}, 0x1c, &(0x7f0000000540)=[{0x0}, {&(0x7f00000001c0)='M', 0x1}, {0x0}], 0x3}, 0x0) 00:42:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 1339.973329][ T7618] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xb, 0x5, 0xff00, 0x3ff, 0x5}, 0x40) 00:42:07 executing program 5: io_uring_setup(0x4a02, &(0x7f0000000100)={0x0, 0x0, 0x8}) 00:42:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x18, r1, 0x301, 0x0, 0x0, {0x6}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0) 00:42:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:42:07 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1, 0x5000500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400000000}, 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000003740)='SMC_PNETID\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 00:42:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="b80100000a06010400000000000000000a0000000900020073797a3000000000500007800c00184000000000000003ff1800168014000240fe8000000000000000000000000000bb08000a40000002e908000a40ffffffff1800018014000240ff0200000000000000000000000000010800094000000f4b0500010007"], 0x1b8}}, 0x0) [ 1340.256819][ T7640] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1340.412541][ T7648] netlink: 312 bytes leftover after parsing attributes in process `syz-executor.5'. 00:42:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x30, 0x0, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x30}}, 0x0) 00:42:09 executing program 4: capget(&(0x7f0000002040)={0x20080522}, 0x0) 00:42:09 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1, 0x5000500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400000000}, 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000003740)='SMC_PNETID\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 00:42:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:42:09 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000300)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) wait4(r1, 0x0, 0x0, 0x0) [ 1343.090606][ T7668] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1343.092165][ T7669] ptrace attach of "/root/syz-executor.5"[8644] was attempted by "/root/syz-executor.5"[7669] 00:42:10 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private1, 0x5000500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400000000}, 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000003740)='SMC_PNETID\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) [ 1343.166291][ T7672] ptrace attach of "/root/syz-executor.5"[8644] was attempted by "/root/syz-executor.5"[7672] 00:42:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={&(0x7f0000000240), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0xffffffffffffffd0, 0xe, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) 00:42:10 executing program 4: sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000080)) 00:42:10 executing program 5: r0 = openat$kvm(0xffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)) 00:42:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:42:10 executing program 1: socket(0x2c, 0x803, 0x0) 00:42:10 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x1) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 00:42:10 executing program 0: clone(0xf6cd5428d25cf0ae, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)) [ 1343.508768][ T7695] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:13 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140), 0x8) 00:42:13 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f0000000c40)=[{&(0x7f0000000600)="9c", 0x1}, {&(0x7f00000006c0)='G', 0x1}, {&(0x7f0000000880)="c3", 0x1}], 0x0, 0x0) 00:42:13 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x1}, &(0x7f0000000100)={0x77359400}, 0x0) 00:42:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1f, 0x0, &(0x7f0000000000)) 00:42:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x28, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) [ 1346.240537][ T7721] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:13 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0xffffffffffffffff) 00:42:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, &(0x7f0000000040)) 00:42:13 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:42:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x28}}, 0x0) 00:42:13 executing program 5: syz_mount_image$fuse(&(0x7f0000000080)='fuse\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@obj_role={'obj_role', 0x3d, '$/'}}, {@pcr={'pcr', 0x3d, 0x29}}, {@obj_type={'obj_type', 0x3d, '#'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '$\'\'+\\'}}]}}) mount$fuseblk(&(0x7f0000000240)='/dev/loop0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x804000, &(0x7f0000002340)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}, {@allow_other='allow_other'}, {@blksize={'blksize'}}]}}) [ 1346.562527][ T7750] fuse: Bad value for 'fd' [ 1346.590784][ T7750] fuseblk: Bad value for 'fd' [ 1346.607037][ T7750] fuse: Bad value for 'fd' [ 1346.613138][ T7752] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:16 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:16 executing program 0: clone(0x29060000, 0x0, 0x0, 0x0, 0x0) 00:42:16 executing program 4: syz_io_uring_setup(0x7, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 00:42:16 executing program 1: futimesat(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) 00:42:16 executing program 5: setitimer(0x2, &(0x7f0000000000)={{0x0, 0xea60}, {0x77359400}}, 0x0) 00:42:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x28}}, 0x0) [ 1349.340806][ T7778] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x18, 0x0, 0x2, 0x301, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 00:42:16 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x80045432, &(0x7f0000000040)={0x0, 0x0}) 00:42:16 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) ioctl$SIOCGIFHWADDR(r0, 0x400454d8, &(0x7f0000000000)={'geneve0\x00'}) 00:42:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x28}}, 0x0) 00:42:16 executing program 1: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)) 00:42:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @local, 0xd24}, 0x1c, 0x0}, 0x0) [ 1349.704388][ T7811] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:19 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:19 executing program 5: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f00000002c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0x0) 00:42:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x20, 0x2, 0x3, 0x8, 0x1}, 0x40) 00:42:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3], 0x28}}, 0x0) 00:42:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f0000000000)=""/233, 0xe9) 00:42:19 executing program 4: sysfs$2(0x2, 0x0, &(0x7f0000000300)=""/184) [ 1352.475983][ T7842] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x88a, 0x1}, 0x40) 00:42:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0xead, 0x0, 0x0, 0x1, [@generic, @generic, @typed={0xc, 0x2, 0x0, 0x0, @u64=0x7f}, @generic="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", @typed={0x8, 0x0, 0x0, 0x0, @uid}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x4000800) 00:42:19 executing program 5: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0xea]}, 0x8) [ 1352.572194][ T7846] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:19 executing program 1: io_setup(0x4, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x2, 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000100)={&(0x7f00000000c0)={[0x6]}, 0x8}) 00:42:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3], 0x28}}, 0x0) 00:42:19 executing program 5: syz_mount_image$ext4(&(0x7f0000005d00)='ext3\x00', &(0x7f0000005d40)='./file0\x00', 0x0, 0x0, 0x0, 0x50800, &(0x7f0000005fc0)) [ 1352.828186][ T7865] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1352.910037][ T7868] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:22 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) read(r0, &(0x7f0000000080)=""/5, 0x5) 00:42:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:22 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:42:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3], 0x28}}, 0x0) 00:42:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x0) keyctl$get_keyring_id(0x0, r0, 0x0) [ 1355.568386][ T7885] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0x0) [ 1355.610307][ T7885] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB], 0x28}}, 0x0) 00:42:22 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x97000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:42:22 executing program 5: socketpair(0x10, 0x3, 0x6, &(0x7f0000000000)) 00:42:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:22 executing program 1: migrate_pages(0x0, 0x2, 0x0, &(0x7f0000000080)=0x1) [ 1355.847076][ T7908] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000000)={'geneve0\x00'}) 00:42:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:22 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x1, 0x1000000}, 0x40) [ 1355.948800][ T7913] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB], 0x28}}, 0x0) 00:42:23 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:23 executing program 1: 00:42:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:23 executing program 5: [ 1356.232596][ T7945] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:23 executing program 0: 00:42:23 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:23 executing program 1: [ 1356.332156][ T7951] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:23 executing program 4: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:23 executing program 5: 00:42:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB], 0x28}}, 0x0) 00:42:23 executing program 0: 00:42:23 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:23 executing program 1: 00:42:23 executing program 4: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) [ 1356.556303][ T7968] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:23 executing program 5: [ 1356.645722][ T7971] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:23 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:23 executing program 0: 00:42:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x28}}, 0x0) 00:42:23 executing program 1: 00:42:23 executing program 4: sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:23 executing program 5: 00:42:23 executing program 0: 00:42:23 executing program 1: [ 1356.976895][ T7992] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:24 executing program 5: 00:42:24 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) [ 1357.065357][ T7996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x28}}, 0x0) 00:42:24 executing program 0: 00:42:26 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:26 executing program 1: 00:42:26 executing program 5: 00:42:26 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:26 executing program 0: 00:42:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x28}}, 0x0) 00:42:26 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:26 executing program 0: 00:42:26 executing program 5: 00:42:26 executing program 1: 00:42:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'], 0x28}}, 0x0) 00:42:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, 0x0, 0x0) 00:42:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:29 executing program 0: 00:42:29 executing program 1: 00:42:29 executing program 5: 00:42:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, 0x0, 0x0) 00:42:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'], 0x28}}, 0x0) 00:42:29 executing program 0: [ 1362.928864][ T8068] __nla_validate_parse: 5 callbacks suppressed [ 1362.928878][ T8068] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:29 executing program 1: 00:42:30 executing program 5: 00:42:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, 0x0, 0x0) 00:42:30 executing program 0: 00:42:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'], 0x28}}, 0x0) [ 1363.297131][ T8088] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:32 executing program 5: 00:42:32 executing program 1: 00:42:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 00:42:32 executing program 0: 00:42:32 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00'], 0x28}}, 0x0) 00:42:33 executing program 5: [ 1366.042827][ T8109] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:33 executing program 1: 00:42:33 executing program 0: 00:42:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 00:42:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00'], 0x28}}, 0x0) 00:42:33 executing program 1: 00:42:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 00:42:33 executing program 5: 00:42:33 executing program 0: [ 1366.363619][ T8127] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:36 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:36 executing program 1: 00:42:36 executing program 0: 00:42:36 executing program 5: 00:42:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:42:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00'], 0x28}}, 0x0) [ 1369.116366][ T8153] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:36 executing program 1: 00:42:36 executing program 5: 00:42:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:42:36 executing program 0: 00:42:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:36 executing program 5: [ 1369.412659][ T8171] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1369.511290][ T8177] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:39 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:39 executing program 1: 00:42:39 executing program 0: 00:42:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:42:39 executing program 5: 00:42:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:39 executing program 0: [ 1372.292555][ T8201] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000000b80)) 00:42:39 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 00:42:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) [ 1372.390764][ T8203] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:39 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000001ec0)='./file0\x00', 0x0, 0x0, &(0x7f0000001fc0), 0x0, 0x0) [ 1372.634717][ T8221] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1372.691103][ T8226] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:42 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10120, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000009040)={&(0x7f0000009300)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:42:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x34) 00:42:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:42 executing program 0: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x10000, 0x200000) 00:42:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x6, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}}, 0x0) 00:42:42 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "8c"}}, 0x119) [ 1375.419629][ T8254] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:42 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5207, 0x0) 00:42:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)={0x1c, 0x0, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 00:42:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 00:42:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1375.609643][T23196] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1375.687359][T23196] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1375.783598][ T8288] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:45 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:45 executing program 1: add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x2, 0xfffffffffffffffe) 00:42:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xd05}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:42:45 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000240)) 00:42:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 00:42:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b6750000", @ANYRES32, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1378.494283][ T8323] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 00:42:45 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x76dc0, 0x0) 00:42:45 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x2, 0x0) 00:42:45 executing program 5: write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) getrusage(0x1, &(0x7f0000000080)) 00:42:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1378.771603][ T8343] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:45 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0x894c, 0x0) 00:42:48 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmmsg(r0, &(0x7f0000001640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002043, 0x0) 00:42:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x28}}, 0x0) 00:42:48 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:48 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) 00:42:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000040), 0x4) 00:42:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0xd, &(0x7f0000000040), 0x4) [ 1381.556044][ T8369] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:48 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)=')%,\x00', r0) 00:42:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x28}}, 0x0) 00:42:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000002440)={0x0, 0x0, 0x0}, 0x2020) 00:42:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 00:42:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x28}}, 0x0) 00:42:48 executing program 5: perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1381.897092][ T8390] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:51 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) 00:42:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x2c}}, 0x0) 00:42:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:51 executing program 0: socket(0x2, 0x0, 0x9e2) 00:42:51 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) [ 1384.656797][ T8426] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1384.687356][ T8428] tmpfs: Bad value for 'nr_blocks' 00:42:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x2c}}, 0x0) 00:42:51 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f000000fe80)={0x0, @xdp, @can, @xdp}) [ 1384.714913][ T8428] tmpfs: Bad value for 'nr_blocks' [ 1384.733496][ T8430] FAT-fs (loop1): bogus number of reserved sectors [ 1384.787078][ T8430] FAT-fs (loop1): Can't find a valid FAT filesystem 00:42:51 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}], [{@euid_eq={'euid'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'batadv0\x00'}}]}) 00:42:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt(r0, 0x107, 0x8, 0x0, 0x0) [ 1384.881833][ T8430] FAT-fs (loop1): bogus number of reserved sectors [ 1384.890881][ T8430] FAT-fs (loop1): Can't find a valid FAT filesystem 00:42:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x6, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x2c}}, 0x0) [ 1385.017635][ T8454] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1385.047886][ T8455] tmpfs: Unknown parameter 'euid' [ 1385.067647][ T8455] tmpfs: Unknown parameter 'euid' 00:42:54 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:54 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/hwrng\x00', 0x0, 0x0) 00:42:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x1, 0x2, 0x201}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000007640)=[{{&(0x7f0000000b40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 00:42:54 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0) 00:42:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0x4020940d, 0x0) [ 1387.745702][ T8483] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 00:42:54 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/hwrng\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000300)) 00:42:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r0, 0x0, 0x0, 0x0) 00:42:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:54 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) 00:42:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) [ 1388.084839][ T8530] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1388.206677][ T8533] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:57 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/hwrng\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 00:42:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:42:57 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:42:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) 00:42:57 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40042408, 0xffffffffffffffff) 00:42:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1390.868462][ T8555] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:57 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x40, 0x1) 00:42:57 executing program 5: socket(0x11, 0xa, 0x20b) 00:42:57 executing program 1: semop(0x0, &(0x7f00000000c0)=[{0x0, 0x7c0, 0x1000}, {0x0, 0x3b}], 0x2) [ 1390.931084][ T8564] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:42:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) 00:42:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:42:58 executing program 4: r0 = socket(0x11, 0xa, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0xf0ff7f}, 0x0) 00:42:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)="86", 0x1}], 0x1}}], 0x1, 0x4004084) 00:42:58 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x841, &(0x7f00000027c0)={[{@size={'size', 0x3d, [0x6d, 0x78]}}]}) [ 1391.227275][ T8579] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1391.323971][ T8581] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1391.410231][ T8592] tmpfs: Bad value for 'size' [ 1391.438387][ T8592] tmpfs: Bad value for 'size' 00:43:00 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) 00:43:00 executing program 4: getitimer(0x0, &(0x7f0000000b00)) 00:43:00 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:43:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:43:00 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') setns(r0, 0x0) 00:43:00 executing program 5: pipe2$9p(0x0, 0x2800) 00:43:01 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 00:43:01 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) [ 1394.036195][ T8611] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1394.129176][ T8615] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) 00:43:01 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:43:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f000000a940)=[{{&(0x7f00000002c0)=@hci={0x1f, 0x0, 0x1}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)="47d7e0c9e5b5f464c13e63c908", 0xd}, {0x0}, {&(0x7f0000000600)="e9", 0x1}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 1394.386484][ T8634] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:01 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 00:43:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 00:43:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)) 00:43:01 executing program 1: r0 = epoll_create(0x1) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040)={[0x7]}, 0x8) [ 1394.472370][ T8637] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:43:01 executing program 5: io_setup(0x2, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) 00:43:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x9, 0x0, &(0x7f0000000000)=0x4b) 00:43:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x3d, &(0x7f0000000040), 0x4) 00:43:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040), 0x4) [ 1394.694966][ T8655] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1394.777527][ T8659] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:04 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:04 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 00:43:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b675", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:43:04 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) 00:43:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000100)=0x334411ab, 0x4) 00:43:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x1) [ 1397.406245][ T8687] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:04 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000005740)='/dev/vcsa\x00', 0x381002, 0x0) 00:43:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000100)='/dev/hwrng\x00') 00:43:04 executing program 5: syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000140)=""/50) 00:43:04 executing program 4: mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x1}) [ 1397.515279][ T8692] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b675", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:43:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) [ 1397.775515][ T8710] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1397.826314][ T8718] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:07 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:07 executing program 1: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 00:43:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000080), 0x4) 00:43:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 00:43:07 executing program 0: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/116) 00:43:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b675", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) [ 1400.513606][ T8735] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:07 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0xc0189436, 0x0) 00:43:07 executing program 1: [ 1400.560239][ T8735] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b67500", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:43:07 executing program 4: 00:43:07 executing program 5: [ 1400.717243][ T8750] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:07 executing program 1: [ 1400.789496][ T8755] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:10 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:10 executing program 0: 00:43:10 executing program 4: 00:43:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b67500", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:43:10 executing program 5: 00:43:10 executing program 1: [ 1403.601959][ T8777] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:10 executing program 5: 00:43:10 executing program 1: [ 1403.679331][ T8779] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:10 executing program 0: 00:43:10 executing program 4: 00:43:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000db53b67500", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) 00:43:10 executing program 5: [ 1403.931861][ T8794] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1404.003505][ T8796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:43:13 executing program 1: 00:43:13 executing program 4: 00:43:13 executing program 0: 00:43:13 executing program 5: 00:43:13 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:13 executing program 3: 00:43:13 executing program 5: 00:43:13 executing program 0: 00:43:13 executing program 1: 00:43:13 executing program 4: 00:43:13 executing program 3: 00:43:13 executing program 0: 00:43:13 executing program 1: 00:43:13 executing program 3: 00:43:16 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:16 executing program 5: 00:43:16 executing program 4: 00:43:16 executing program 0: 00:43:16 executing program 1: 00:43:16 executing program 3: 00:43:16 executing program 4: 00:43:16 executing program 5: 00:43:16 executing program 1: 00:43:16 executing program 0: 00:43:16 executing program 3: 00:43:16 executing program 5: 00:43:19 executing program 1: 00:43:19 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:19 executing program 4: 00:43:19 executing program 3: 00:43:19 executing program 0: 00:43:19 executing program 5: 00:43:19 executing program 3: 00:43:19 executing program 0: 00:43:19 executing program 4: 00:43:19 executing program 5: 00:43:19 executing program 1: 00:43:20 executing program 3: 00:43:20 executing program 4: 00:43:22 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:22 executing program 0: 00:43:22 executing program 5: 00:43:22 executing program 1: 00:43:22 executing program 3: 00:43:22 executing program 4: 00:43:23 executing program 3: 00:43:23 executing program 4: 00:43:23 executing program 1: 00:43:23 executing program 5: 00:43:23 executing program 0: 00:43:23 executing program 1: 00:43:26 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:26 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0x400c001, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @dev, 'syzkaller0\x00'}}, 0x80) 00:43:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 00:43:26 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x280240, 0x0) 00:43:26 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) 00:43:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 00:43:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 00:43:26 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) 00:43:26 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 00:43:26 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) accept(r0, 0x0, 0x0) 00:43:26 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x400, 0x0) 00:43:26 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) 00:43:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:29 executing program 4: execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x400) 00:43:29 executing program 1: setreuid(0xee01, 0xee01) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self\x00', 0x50882, 0x0) 00:43:29 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0xfffffffffffffc5a) 00:43:29 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000002600)='/proc/self\x00', 0x10901, 0x0) 00:43:29 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) listen(r0, 0x0) 00:43:29 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 00:43:29 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)='net_prio.ifpriomap\x00', 0x2, 0x0) 00:43:29 executing program 4: 00:43:29 executing program 1: 00:43:29 executing program 0: 00:43:29 executing program 4: 00:43:32 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:32 executing program 5: 00:43:32 executing program 3: 00:43:32 executing program 1: 00:43:32 executing program 0: 00:43:32 executing program 4: 00:43:32 executing program 0: 00:43:32 executing program 5: 00:43:32 executing program 3: 00:43:32 executing program 4: 00:43:32 executing program 1: 00:43:32 executing program 0: 00:43:35 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:35 executing program 1: 00:43:35 executing program 3: 00:43:35 executing program 4: 00:43:35 executing program 5: 00:43:35 executing program 0: 00:43:35 executing program 5: 00:43:35 executing program 3: 00:43:35 executing program 1: 00:43:35 executing program 0: 00:43:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$inet_mreqsrc(r1, 0x0, 0x49, &(0x7f0000000180)={@multicast2, @multicast2, @broadcast}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 00:43:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0x3, 0x0, 0x0, 0x0) 00:43:38 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x104, &(0x7f0000000340), &(0x7f0000000180)=0x1) 00:43:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r4}, &(0x7f0000000040)=0x10) 00:43:38 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="a68659314d2d", @empty, @empty, @remote={0xac, 0x14, 0x0}}}}}, 0x0) 00:43:38 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_group_source_req(r0, 0x29, 0x4, 0x0, 0x0) 00:43:38 executing program 5: syz_emit_ethernet(0x56, &(0x7f00000004c0)={@local, @broadcast, @val, {@ipv6}}, 0x0) 00:43:38 executing program 5: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = shmget(0x3, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x0) 00:43:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x25, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r2}, &(0x7f0000000040)=0x10) 00:43:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x5de8}, 0xa0) 00:43:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000080)=ANY=[@ANYBLOB="1c1c4e2306000000ff"], &(0x7f0000000140)=0x98) 00:43:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), 0xa) 00:43:38 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x420041, 0x0) 00:43:41 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x30) 00:43:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:43:41 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 00:43:41 executing program 0: syz_emit_ethernet(0x9a, &(0x7f0000001240)={@local, @broadcast, @val, {@ipv4}}, 0x0) 00:43:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@sndrcv={0x2c}], 0x2c}, 0x0) 00:43:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet6_sctp(0x1c, 0x1, 0x84) r6 = dup2(r4, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040), 0xc) 00:43:41 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@random="c3996a363515", @broadcast, @val, {@ipv6}}, 0x0) 00:43:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setstatus(r0, 0x4, 0x40) 00:43:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f00000004c0)={0x2, [0x3, 0x0]}, 0x8) 00:43:41 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 00:43:42 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:43:44 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180), &(0x7f0000000040)=0xa0) 00:43:44 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) 00:43:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f0000000240)="ea", 0x1, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 00:43:44 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0x0) 00:43:44 executing program 0: syz_emit_ethernet(0xa7, &(0x7f0000000000)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 00:43:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002340)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000002300)=[@authinfo={0x10}], 0x10}, 0x0) 00:43:44 executing program 1: r0 = socket(0x2, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8202ad4fac"], 0x10) 00:43:45 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0), 0x98) 00:43:45 executing program 0: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) syz_emit_ethernet(0xa7, &(0x7f0000000480)=ANY=[], 0x0) 00:43:45 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c}, 0x1c) 00:43:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f00000003c0), &(0x7f0000000680)=0xc) 00:43:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001580)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001340)=[{&(0x7f00000000c0)="40ac956ec71a2cb806476477b00a44da1d59a2b73c5e599fc718ff8fde67456fcbd9b9ca8276cae408e8cf5f72bbd6b16c1c1e9d161f756edb568e0d84c926fc9819d1ababbb1e9630022c3c6c7e509c6ce5059fefb02333e56ef052723eaf1aed59532d337f5df460d827732c122c10630e1ac07ef08fd97ce0306ad31967cc341b525bccf936b31ef7e65368c7a9599d0c29b97a054899db6a9eb54f31b67306440de597ca739206223b0bdba34e03b965eec82caacb79470572de", 0xbc}, {&(0x7f0000000180)="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", 0xf35}], 0x2, &(0x7f00000014c0)=[@prinfo={0x14}, @sndrcv={0x2c}, @sndinfo={0x1c}, @sndrcv={0x2c}, @init={0x14}], 0x9c}, 0x0) 00:43:47 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:47 executing program 0: r0 = socket$inet6(0x1c, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x1c, 0x1c, 0x3}, 0x1c) 00:43:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000002540), &(0x7f0000002440)=0x94) 00:43:47 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred, @rights, @cred, @cred, @rights, @rights], 0xe8}, 0x0) 00:43:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x4, &(0x7f0000000040)={0x10, 0x2}, 0x10) 00:43:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001200)={0xffffffffffffffff}) writev(r0, &(0x7f00000014c0)=[{&(0x7f0000001000)="0e", 0x1}], 0x1) 00:43:48 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x19, 0x0, 0x0) 00:43:48 executing program 3: setrlimit(0x8, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ptmx\x00', 0x0, 0x0) 00:43:48 executing program 5: r0 = socket$inet6(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 00:43:48 executing program 0: r0 = socket$inet6(0x1c, 0x5, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 00:43:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0xfea7, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000002c0)={0x0, @in, 0xfffffffe, 0x0, 0x289}, 0x98) 00:43:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0xa}, 0xa) 00:43:51 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000280)="5cf249b974057c79b1c2ed44c921bf3c0f339e57f4f21016a5b60a00088024c30e4789469190ad0000000000000000ba4ecb40aa073e905834c90761600032a3b88a1f000000970e85a63c9a4b"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000), 0x4) 00:43:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0xfea7, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000008c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000680)=[{&(0x7f00000009c0)="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", 0x1000}, {&(0x7f00000019c0)="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", 0xff1}], 0x2, &(0x7f0000000780)=[@sndrcv={0x2c}], 0x2c}, 0x0) 00:43:51 executing program 5: r0 = socket$inet6(0x1c, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xf802cfc4a2c1d24e, &(0x7f0000000280)={0x1c, 0x1c, 0x3}, 0x1c) 00:43:51 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x9) 00:43:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) 00:43:51 executing program 4: r0 = shmget(0x3, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r1 = shmget(0x3, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x3000) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 00:43:51 executing program 1: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@broadcast, @random="8dce5cc1b6e0", @val, {@ipv4}}, 0x0) 00:43:51 executing program 0: r0 = socket$inet6(0x1c, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="993b102d5b5b0f2242edca4a7000ce2b7627b8781ae360cf4d0b2ade6d7a7c69748ece935c901eeb5eddddf7ca9653a271d4654d83ac28934c7a67aa63b7154ae56df8b35757ea92180070b3771c90ac6b130f83fbe649e312cd353c3a", 0x5d, 0x8, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 00:43:51 executing program 5: open$dir(0x0, 0x1fe, 0x0) 00:43:51 executing program 3: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x5}, 0x0, 0x0) 00:43:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x4d293fcb8e7113cc, 0x0) 00:43:54 executing program 1: msgget(0x3, 0x208) 00:43:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000000)=ANY=[@ANYBLOB="1c1e4e2100000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000ff00"/115, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00 '], &(0x7f00000000c0)=0x98) 00:43:54 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000140), 0x10) 00:43:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0xfea7, 0x2}, 0x10, 0x0}, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000200)) 00:43:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000000), &(0x7f0000000140)=0x8) 00:43:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x8002, &(0x7f00000005c0)=ANY=[@ANYBLOB="1002"], 0xa0) 00:43:54 executing program 1: r0 = socket$inet6(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 00:43:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000080), 0x8) 00:43:54 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg(r0, &(0x7f0000001800)={&(0x7f0000000140)=@un=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f00000014c0)=[{0x10}], 0x10}, 0x0) 00:43:54 executing program 4: r0 = socket$inet6(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xf802cfc4a2c3d343, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 00:43:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) r5 = dup2(r3, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000016c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x900, &(0x7f0000000000)={r6}, 0x8) 00:43:54 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000001800)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000180)="b4d3d4d685a26e25b44d706a9023ac072b69a2c88e67a1d5c8e49ddc6b23ddc1ded2b1fb0cee8e55b0cc8c071cb2d6abaaee1b1647a31debc9a6c191d24bad782b1aa421cd87731bd489e3308ec12fa277bf4f0a4ff32a00554cac9cde8f8f0a393d19e4aa4e498c8c02035c50cfb374317d89dd1c0239f4dad6acff5ec826e18bab4c45d23b8a44eef16b7584f8d3db94ab19938ef4a152f23e4748d58dfc34b7226a3318fc4b194ca6a83b34d2c87072699d0c56e4fb3700972b39a125fb82d371afdc3ab18f3e114276f6997fd9d15aded097f5353e3d784c10aeac607dc06564c6bd02e20b9532b124e2defcb1816dc195e253c8df80ff144b44e3c640094b01a4f30954490296f8c78fd8dd1d9341bb24d3a97f84467b599f7f0479d64f0ac93dad307542df67ee8886d9f3f6f334b88d6173587406a7310d3d1f34e56a5a0c9db2cb4cac7804db84868633f38be7a072852ff90396d7d450565ebbefdc37b5546c8ecbb75fa127de747da5257e6651395dbf0fe4e1bd001fe351136e318c322d66ab67730a85f539ceb187e9c1d6c3897c04e895d08455459c4161982def8c2ee0399811b04b668fcddcb1ed4a7e3656fd35af5a92493273b2e137d4c840fb17b62a16f8736d53399a38b0e056870ec9ad999cdd238a4ef6753fe84a627e8e67174e5b1ad4341a06d82014156fef589a68fefcdfec87d075fce73cdaf81edca6a481f6f5aa24c20b8162da6d0550349a558badaded6f4d828c8189976dc95ff12e8edcf225a4cf456c17817619acc51bf70a00fd577d4e803ef98ec0cec97cbe6858d16cd9386660fae156714d1137fdccb3f77374aabab57c09d990a75fbb77f8279d1eb8e3473ee07a0ac21a46da7ee2d430a17f433f044a985b660351184d454c4e6495ad49073c9628bf1820a848750ac8533db047860b1a5fff14dc7be55604770469596785d45d70030fec3e977ed4649867fcf8026d5c6cbc2788981a004c7e3be7944c8ec38195ac0646cad833b8630ad349195397635e916b02d4539ce924e1cb14f5c47a6e12c4df0e9822f60cefae0c137b62dc661d49cd91598cb36449152c92300caacfafad4c61bce9fd897c2ef5424ffcada75e5c4076ff11d5061becbe30e6441b0b5b5bf24b9af6e663cc1a6a72b47ef2cd9441dc7d73831ed916962f08a1315e3aaa0f2e8f5e5f123037526bee83ab44c0225fbc4eb52b0720fcfa0a6c714a8d5a266cd163838f2077ace3991182c7435a515acce48487ae581610096ecbc6de3d8e4e9abcde79c19ec1550cc6bb8727717b921924bd5b14c1b640571835ce0d3f0eeae6b54e001450080ddb3ea9bee38f4d4d3ac540ab26498bc33a8edb6c801282ea2379c1f5da103160f8e7b430e0d7efc639397331839b2c6d90c882e8051e4c20682f8b5158857ef565205a9205db063fb36c3d785c8e1da0f972a2483e8e5468c703e757c162bfdc5e5e05e2ede2a478ee477872131381f09b497bea345d87b4e44e40adaa71e43e760c265c830456beda80b3b144427da14e84798d9f06e204313418db811ab9021d007e9e189b14a32e0a3603e00926e2762dfa040e1e2e27b0f1e90bb7b5cdea6a58eefecb16f293363155b11dfd69d2886957efdec4d06a0792ff7b91af556e8d58ee09bf6cfd5c17177b46d1930a9a8d7327b6687de2c8a35122890e0c352aeb12cdb2d7e6cfb549a22d4728b26ec0f0237d8a38ee5267931444238056eb0b067a932504db78863c3bc607422874c60d42eff1c6089608e6e281e83b4cee691ed84f8e03641d61fce314e255cf89e84ecca62ef075de162bf203bb4cc127849df27510a5aa4a7bf05f1de8a4409da771abecc963838eaabeb820ac2a771e5439b59c134d93eff2b6b9a2dc96cf52b0536cd0a1ca96c835cc72a3a9bd34f18ab5cae755f4bc4fb0958ac1cb40cb2fe5954d0c286dc8496105eaf3338c5d371c24c52aa7ac6c7b6e9db002be11d2a18c1b519c0a0a2772e4dfd0283c15ea18d4443ce849bd7306ace77a161d54a74584772f894d446a7c2bec76778d7708e57688101e6b768bdd9f17597c29aa0b073f975d5c5a0cfe53a119cd314dbfd49608d173ebc1e489481f4b179bf37b9767f47ad2417163932a13431ab488a6037d818dc9c91662429ab02da43d96a9f28d468154a65ccd114e04174be328325ddd6427f88b89be3dc219dc6c9e2a05d8846213785ef52227956ef4b255f8f8d6a0968f26dbcda15349c8e331e9a44756e5af1cbc9ea1319ab35722420afb6215c4b7d1adfed57cd1d57ca209eb0038dbd4ebfc581326e3482417b37de2832dffa88e449a2ffa0a114037a87e5c06470e4dd365a0af5e05332160bddd5dad30f611189841ad200f60e54c6593826d7f938c6659bdca874fa07737e1005597380daa6284f5cda1e9590dab36227957979dea5ba482152c8aa4b28e91006434df78f67197865c2871fe928ad26f7f4e4b28a71e722963ca85b4f350b24b922da2d005f44d69dc01de61ef412bbe61851bb19e0af4b57f3293450b3e024f2d4ca2de1c78584e067e439dc798a644920cdaa11ece88a583c47811a4562d208f1e80f0e48bdda69e63d19badd2a9bbba97206d9daed87e18a2d5385c30aa651925f036bf04876c4ba1064ffbb03a36255fcbebfd138477dcee4b5be8016fa6c437c1606072dd7268b8d12ec41576d16587c3cba61a393164937d99bcffefc92a877e6563878902b3fdf1f425d81960baf47c82a6648469e278b6d896b2bf083c40a1701d41314012be439f500dc2a3cb966367f33faf911d3b6a32ba1295295605b4cfb90f21ce2ac1990613503e93bf7606800411c33490664fe3e2725bfbab943963fdeb5b5a72203d8c61dbcac869e7d5e7547c24d6b7206b5a8ddbb7a24cd88e0028261b1321f6bd71e522987f79d757a91db3d6b5a8137c973ee165d79151e071aaf0427366674dc030f06dc9130ab5e7e55e5d1e1701f6fbaef1ec5e44619b9dee2a77a2947be470e889d4e8fcc2177d7c40582dc818b3545413fc1e5f58bda850250c0f019b2c0d74c46d0dd0c91045c274eb3b678ae0679db9c8cbc95e5d6362354015fe05e7c761a030d96d72dd6314804427a4e597a54b481a245b1c09413a7812833f5f4a8c5439bbaa08741b765b19994467f60768b6038ba526f9950bf637dadf8b284caa6a6390f2309d1302a21fafd12c2ff5ba67d12d9c41ef6d17999d5371549fc735304805de682b27c5ca56a825e1c2c0b5c343dc205fa1f58049d971f178a07a7905c3fe31fae375785ccca93140ab9b70ff7623fdb359504e1bb43932dd19110e221150e426dd7a888f1d19a53eeb1c4111e23c00f7b5dbbbdc32c83a1ff662e63ddaaf4de35f1239a8e3e0f7d528c0f0aeebd902349fa033f6d48f5eac0bb67aedfa578f2a3af9db77d8ca8fd379acd164a2e4fc2b50baf4d19f1a899f39258e3946748263e9cbfa123ab458b8d33d43f70c064afe5da89d679cec8fc9aa359356867e408326080755bfefee728aba328dc3df80e2cad47ce8388c02fd3825cb7d2dd5f02ce9c53c2630683e7209c109aa592dbb79ae0377892b2163ce1e241b928132e891be72147c1d0736e90a785ee7ef50411e099b4507fb96bbe4256111c386e6a7b6c309e8bff96b8f2ce2d3358c9bec5436afb22f877d9ad4f2d9b2aec03e0ae373bad95460dfe9ca982dfdf4807d0cfc7960407773ea778bc67b787d1ddbaba5e8cd9d303700097f5b8b50f0c1f57cfc2572603a60c4f701ee939aa612476b53da8c48bee7cc8a377128a3f45b53d2e9e10baba4cbb94c30f7213addc1d16cf807e138a0532fbd328b9635d47f26a4b9e3ff87ba258add48d39d4326cdccf4020d15db24debfcab4a87cff89a652a4dd9841cf582c62cff1899e982ff7fad0af4af21097f0d374f38cdd9fc28446f99e4f894d2772664566445ad123a9da339a2d571117f7cd53c64866c46f63ada58e059affad8c8ea146953496cc97a39a59b63a80f75fa140fdb2ec8e18154e2b0ca14ccfff2099d8f7b8798d3d991d8d1cf14ab15534374ec704e7941980eeda4bd3e1d273f2b3503d6a60632d3c865c7527a1250ace1c10594d87313bc1f9fb0a47dd4de609a9f28120d50456b3bf2676e09beabc070af538ad8903991c36441eac2ada647321fe67518337c506ac38f9c65b933ac1e45f8a1c13634bbffed264aee29c15d31b69dd28ee7c72ae2f738819f638309e0582b371948df212a6cf28a1ad49d1f96d1e76c05ef7ec84fee2ce17921c4631f6f2a26a366ffcd1dbf7fc0005e7e1360b5d142db26bd809f9c85d881a84606227bffe3a829dc82fb02531f8d6f578b4e35d1c707efa1bf5e1ed28b40ea2556c7c7d13d05067249077247c238bb66830eba33d36d8b80c46ea3f58f66689f53089d84b0079823797c6d907caf4c13b81709a1de62802269ab2d76c0945f54e90f9e93a48e2bf4a1c8dc77a7fc2e62c0564d8f57faf98f4c2a7a1b2ce51c60ce075391e64f30b91f19f145d2593ca723aa2dee8115f38c3d72719b8d9867f3a435cec97954f78b74213a8b15906d3072539702506949181266aa4ba314b13d316dc9bc46879de3d672b2b99fa793199f4950770460b3b9f397dfaa9b4ea6b319e83a58f9e6353534057e7c3d9c236e8ff7d27e9c4a41331ce3ed4ffde39a53a10f43ee8aa6287eaffadb2ac5c0fd5a9ea3f70939b7da96a9523b23247d3fbd3387e9705997008a16e9abe856a8466ceb83c6d07b2697f5e1f61266e6f3423a73ca4de2f1ad69a3d5240888ee1448dfc5b76f01ca5d19d2c12ca61065fdc0cb808d436e384ab9765d33f40dc0609f381dd323f7e6edfaf57eeb7e77eb5ffb945ce46628ae20dc8ad42edb442fe9d51e7a6b86cf198f131a5ae7fbb06a7d7e819aa896ae2d0a679b9b1b272ec99abf971ed949956f8f87cb43d9f88cf527f11a1233693beac37d0527b2275ec987f321d7d085ebb9a6ccf91fd8ea10c35e53638a3e9cdb4fa49a558d67d9ca6d48e4fdf529cebf713d52859ff7850ad1e6dfdf8cd5e0843fc28f0d330a1a282e27a4e79567ad167d726d436197236cba2954073ae6cf2e1282870bb11654c54df90a5f44056f45863905c8c9f5068d61887cb97c5aadfd73d2266503a175d277356155ab299b90ce286afa4371a9d11a865a4ef231b742a9f439accdc37fc59dd5455c09c65f0a7617fc78d47c168f5eba85f60fd5a4610ced5033fce12330b0a6b68e930718399629a190f978145aba9879281707e046c6b1a29c96c878786fa69126a8a44a7510ad3cc146b881e7c328ef98a6ad7cee238b74399420519079238ac1606fb2c126d442c92f91cd4443d5e8c1292b627c3aea5fdc13111ebc79f005870da81d1df14320d7c7fef35752d53c9933b3e3481468b8d6b6ca829aab4f27423313d840fd78da9173ed45bd4cef54e6556f13e39e0b5643c61450c3145d32e3409b5dc39ed63c8a9380b0e003e4bc24378e6e693bbb6e49de3871342994e6fca15ec93a37c5153348f0e163c601991264ef082636e6a70ae52e9c6fa207d0f8f2f93af0fa848ae30f08f69432dd8288d3f336b8a17692135270647d37a5177179c6b62f8794d3423a0f480a33f2e12a48e0fa19e6ffdd76b4f200f27ef3683eef7609baa3e08473b93cd8ee66207221b3ec0282bfca239a054ac6525852510d7bca9553cc1e70e31502a84ce064b7d7a5d69860e1f36f26e80ae5fd3e18e4532cbfea7c0b5e04bac41ec17", 0x1000}, {&(0x7f0000001180)="1902f94464a2868eebbf2ff2dcce2026c4b727d4952c79c240cb0af4777c29c594975ac4fc3146a8df2439b4c0f4530012cb6eb4acd8a6b04761ca035142167b0cd11ed66ad68392bb9e27d4b2e28f8e2a14e064ddf969e410e315343532af97473d291e2f90cb6c2484d63190f9b6af93e7a02058598a43a08a2188b5688f61f1bdfb2275d73718", 0x88}, {&(0x7f0000001240)="3ce349d4d3cd69e4338ccf1a74f6c08690dc5f5a45e93cc17b43a01be09e6e3afe1cf4f95588c53e481b83241ea10e85ec31b88d9426a7096c8b3bedd9d4237390276c3bb7c8be812f6889abc42f8062bca250cee4850e3203", 0x59}], 0x3}, 0x0) 00:43:54 executing program 1: r0 = socket$inet6(0x1c, 0x1, 0x0) r1 = dup(r0) sendto$unix(r1, 0x0, 0x0, 0x20101, &(0x7f00000000c0)=@file={0xa}, 0xa) 00:43:57 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:43:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x60189, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:43:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 00:43:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 00:43:57 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) fcntl$setown(r0, 0x6, 0x0) 00:43:57 executing program 1: r0 = socket$inet6(0x18, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 00:43:57 executing program 4: r0 = socket(0x18, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1007, 0x0, 0x0) 00:43:57 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) fcntl$setstatus(r0, 0x4, 0x40) 00:43:57 executing program 1: 00:43:57 executing program 0: 00:43:57 executing program 5: 00:43:57 executing program 0: 00:44:00 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:44:00 executing program 1: 00:44:00 executing program 3: 00:44:00 executing program 5: 00:44:00 executing program 4: 00:44:00 executing program 0: 00:44:00 executing program 4: 00:44:00 executing program 0: 00:44:00 executing program 1: 00:44:00 executing program 3: 00:44:00 executing program 5: 00:44:00 executing program 5: 00:44:03 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:44:03 executing program 1: 00:44:03 executing program 0: 00:44:03 executing program 3: 00:44:03 executing program 4: 00:44:03 executing program 5: 00:44:03 executing program 3: 00:44:03 executing program 1: 00:44:03 executing program 5: 00:44:03 executing program 4: 00:44:03 executing program 0: 00:44:03 executing program 3: 00:44:06 executing program 1: 00:44:06 executing program 4: 00:44:06 executing program 5: 00:44:06 executing program 0: 00:44:06 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:44:06 executing program 3: 00:44:06 executing program 3: 00:44:06 executing program 0: 00:44:06 executing program 5: 00:44:06 executing program 1: 00:44:06 executing program 4: 00:44:06 executing program 5: 00:44:06 executing program 4: 00:44:06 executing program 3: 00:44:06 executing program 0: 00:44:06 executing program 1: 00:44:09 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:44:09 executing program 5: 00:44:09 executing program 1: 00:44:09 executing program 4: 00:44:09 executing program 0: 00:44:09 executing program 3: 00:44:09 executing program 1: 00:44:09 executing program 4: 00:44:09 executing program 0: 00:44:09 executing program 3: 00:44:09 executing program 5: 00:44:09 executing program 1: 00:44:12 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:44:12 executing program 4: 00:44:12 executing program 0: 00:44:12 executing program 3: 00:44:12 executing program 5: 00:44:12 executing program 1: 00:44:12 executing program 5: 00:44:12 executing program 3: 00:44:12 executing program 0: 00:44:12 executing program 4: 00:44:12 executing program 1: 00:44:13 executing program 5: 00:44:15 executing program 0: 00:44:15 executing program 3: 00:44:15 executing program 4: 00:44:15 executing program 1: 00:44:15 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:44:15 executing program 5: 00:44:16 executing program 0: 00:44:16 executing program 1: 00:44:16 executing program 5: 00:44:16 executing program 4: 00:44:16 executing program 3: 00:44:16 executing program 0: 00:44:16 executing program 4: 00:44:16 executing program 1: 00:44:16 executing program 5: 00:44:16 executing program 3: 00:44:19 executing program 0: 00:44:19 executing program 1: 00:44:19 executing program 5: 00:44:19 executing program 4: 00:44:19 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:44:19 executing program 3: 00:44:19 executing program 1: 00:44:19 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @multicast, @val={@val={0x8100}}, {@ipv6={0x86dd, @udp={0x0, 0x6, "7cfc41", 0xc, 0x11, 0x0, @local, @mcast2, {[], {0x0, 0x4e23, 0xc, 0x0, @opaque="dcb5b0e6"}}}}}}, 0x0) 00:44:19 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd6000040000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="c2"], 0x0) 00:44:19 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000000314f9ff"], 0x38}}, 0x0) 00:44:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) 00:44:19 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 00:44:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) 00:44:19 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0) 00:44:19 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, 0x0, &(0x7f0000000080)) 00:44:19 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x4, 0x0, @remote, @local}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 00:44:22 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, &(0x7f0000000280)}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:44:22 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000000314010000008000000400000900020073797a30000000000800410073697700140033006c6f"], 0x38}}, 0x0) 00:44:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 00:44:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x15, 0xa, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:44:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x4, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 00:44:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @local}, 0x10) 00:44:22 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0xc0045878, 0x0) 00:44:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={0x0}}, 0x0) [ 1475.273280][ T9620] lo speed is unknown, defaulting to 1000 [ 1475.308504][ T9620] lo speed is unknown, defaulting to 1000 00:44:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='ipvlan0\x00') 00:44:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000004180), 0x4) [ 1475.373357][ T9620] lo speed is unknown, defaulting to 1000 [ 1475.395681][ T9620] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1475.480450][ T9620] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 1475.525457][ T9620] [ 1475.527888][ T9620] ============================================ [ 1475.534031][ T9620] WARNING: possible recursive locking detected [ 1475.540181][ T9620] 5.10.0-rc4-next-20201119-syzkaller #0 Not tainted [ 1475.546761][ T9620] -------------------------------------------- [ 1475.552912][ T9620] syz-executor.4/9620 is trying to acquire lock: [ 1475.559237][ T9620] ffffffff8c684748 (lock#6){+.+.}-{3:3}, at: _destroy_id+0x299/0xa00 [ 1475.567432][ T9620] [ 1475.567432][ T9620] but task is already holding lock: [ 1475.574793][ T9620] ffffffff8c684748 (lock#6){+.+.}-{3:3}, at: cma_add_one+0x55c/0xce0 [ 1475.582898][ T9620] [ 1475.582898][ T9620] other info that might help us debug this: [ 1475.590948][ T9620] Possible unsafe locking scenario: [ 1475.590948][ T9620] [ 1475.598389][ T9620] CPU0 [ 1475.601663][ T9620] ---- [ 1475.604936][ T9620] lock(lock#6); [ 1475.608577][ T9620] lock(lock#6); [ 1475.612215][ T9620] [ 1475.612215][ T9620] *** DEADLOCK *** [ 1475.612215][ T9620] [ 1475.620350][ T9620] May be due to missing lock nesting notation [ 1475.620350][ T9620] [ 1475.628668][ T9620] 6 locks held by syz-executor.4/9620: [ 1475.634148][ T9620] #0: ffffffff8fa75878 (&rdma_nl_types[idx].sem){.+.+}-{3:3}, at: rdma_nl_rcv_msg+0x15b/0x690 [ 1475.644567][ T9620] #1: ffffffff8c66c490 (link_ops_rwsem){++++}-{3:3}, at: nldev_newlink+0x261/0x540 [ 1475.653965][ T9620] #2: ffffffff8c65bd90 (devices_rwsem){++++}-{3:3}, at: enable_device_and_get+0xfc/0x3c0 [ 1475.663927][ T9620] #3: ffffffff8c65bc50 (clients_rwsem){++++}-{3:3}, at: enable_device_and_get+0x163/0x3c0 00:44:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000003c0)={'icmp\x00'}, &(0x7f0000000400)=0x1e) [ 1475.673956][ T9620] #4: ffff88807eda8598 (&device->client_data_rwsem){++++}-{3:3}, at: add_client_context+0x3d0/0x5e0 [ 1475.684861][ T9620] #5: ffffffff8c684748 (lock#6){+.+.}-{3:3}, at: cma_add_one+0x55c/0xce0 [ 1475.693397][ T9620] [ 1475.693397][ T9620] stack backtrace: [ 1475.699310][ T9620] CPU: 0 PID: 9620 Comm: syz-executor.4 Not tainted 5.10.0-rc4-next-20201119-syzkaller #0 [ 1475.709187][ T9620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1475.719233][ T9620] Call Trace: [ 1475.722541][ T9620] dump_stack+0x107/0x163 [ 1475.726896][ T9620] __lock_acquire.cold+0x115/0x39f [ 1475.732057][ T9620] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1475.738042][ T9620] lock_acquire+0x2a3/0x8c0 [ 1475.742552][ T9620] ? _destroy_id+0x299/0xa00 [ 1475.747142][ T9620] ? lock_release+0x710/0x710 [ 1475.751815][ T9620] ? __lock_acquire+0x26cb/0x5c00 [ 1475.756856][ T9620] __mutex_lock+0x134/0x1110 [ 1475.761447][ T9620] ? _destroy_id+0x299/0xa00 [ 1475.766037][ T9620] ? _destroy_id+0x299/0xa00 [ 1475.770626][ T9620] ? lock_downgrade+0x6d0/0x6d0 [ 1475.775475][ T9620] ? mutex_lock_io_nested+0xf60/0xf60 [ 1475.780890][ T9620] ? find_held_lock+0x2d/0x110 [ 1475.785658][ T9620] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1475.791242][ T9620] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1475.797139][ T9620] ? cma_cancel_operation+0x26/0xa60 [ 1475.802427][ T9620] ? wait_for_completion_io+0x260/0x260 [ 1475.807974][ T9620] _destroy_id+0x299/0xa00 [ 1475.812415][ T9620] cma_listen_on_dev.cold+0x168/0x16d [ 1475.817789][ T9620] cma_add_one+0x667/0xce0 [ 1475.822207][ T9620] ? cma_remove_one+0x470/0x470 [ 1475.827103][ T9620] ? do_raw_spin_unlock+0x171/0x230 [ 1475.832310][ T9620] ? cma_remove_one+0x470/0x470 [ 1475.837163][ T9620] add_client_context+0x405/0x5e0 [ 1475.842189][ T9620] ? remove_client_context+0x110/0x110 [ 1475.847677][ T9620] ? __raw_spin_lock_init+0x34/0x100 [ 1475.853079][ T9620] enable_device_and_get+0x1d5/0x3c0 [ 1475.858374][ T9620] ? add_one_compat_dev+0x800/0x800 [ 1475.863574][ T9620] ? rdma_counter_init+0x205/0x400 [ 1475.868687][ T9620] ib_register_device+0x7a0/0xa30 [ 1475.873717][ T9620] ? enable_device_and_get+0x3c0/0x3c0 [ 1475.879176][ T9620] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 1475.884982][ T9620] ? lockdep_init_map_waits+0x26a/0x720 [ 1475.890592][ T9620] siw_newlink+0xddb/0x1340 [ 1475.895120][ T9620] ? siw_get_base_qp+0x490/0x490 [ 1475.900063][ T9620] nldev_newlink+0x30e/0x540 [ 1475.904653][ T9620] ? nldev_set_doit+0x430/0x430 [ 1475.909501][ T9620] ? mark_lock+0xf7/0x24c0 [ 1475.913939][ T9620] ? lock_release+0x710/0x710 [ 1475.918613][ T9620] ? mark_lock+0xf7/0x24c0 00:44:22 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000000114f9ff"], 0x38}}, 0x0) [ 1475.923074][ T9620] ? apparmor_capable+0x1d8/0x460 [ 1475.928138][ T9620] ? ns_capable+0xde/0x100 [ 1475.932553][ T9620] ? nldev_set_doit+0x430/0x430 [ 1475.937399][ T9620] rdma_nl_rcv_msg+0x367/0x690 [ 1475.942167][ T9620] ? rdma_nl_multicast+0x310/0x310 [ 1475.947281][ T9620] rdma_nl_rcv+0x2f2/0x440 [ 1475.951699][ T9620] ? rdma_nl_rcv_msg+0x690/0x690 [ 1475.956708][ T9620] ? netlink_deliver_tap+0x227/0xb70 [ 1475.962001][ T9620] netlink_unicast+0x533/0x7d0 [ 1475.966768][ T9620] ? netlink_attachskb+0x870/0x870 [ 1475.971931][ T9620] ? __phys_addr_symbol+0x2c/0x70 [ 1475.976987][ T9620] ? __check_object_size+0x171/0x3f0 [ 1475.982271][ T9620] netlink_sendmsg+0x856/0xd90 [ 1475.987034][ T9620] ? netlink_unicast+0x7d0/0x7d0 [ 1475.992011][ T9620] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1475.997299][ T9620] ? netlink_unicast+0x7d0/0x7d0 [ 1476.002299][ T9620] sock_sendmsg+0xcf/0x120 [ 1476.006725][ T9620] ____sys_sendmsg+0x6e8/0x810 [ 1476.011511][ T9620] ? kernel_sendmsg+0x50/0x50 [ 1476.016190][ T9620] ? do_recvmmsg+0x6c0/0x6c0 [ 1476.020784][ T9620] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1476.026762][ T9620] ___sys_sendmsg+0xf3/0x170 [ 1476.031354][ T9620] ? sendmsg_copy_msghdr+0x160/0x160 [ 1476.036686][ T9620] ? __fget_files+0x272/0x400 [ 1476.041367][ T9620] ? lock_downgrade+0x6d0/0x6d0 [ 1476.046218][ T9620] ? find_held_lock+0x2d/0x110 [ 1476.050987][ T9620] ? __fget_files+0x294/0x400 [ 1476.055663][ T9620] ? __fget_light+0xea/0x280 [ 1476.060247][ T9620] __sys_sendmsg+0xe5/0x1b0 [ 1476.064739][ T9620] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1476.069846][ T9620] ? __do_sys_futex+0x2a2/0x470 [ 1476.074710][ T9620] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1476.080592][ T9620] do_syscall_64+0x2d/0x70 [ 1476.085000][ T9620] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1476.090879][ T9620] RIP: 0033:0x45deb9 [ 1476.094766][ T9620] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1476.114361][ T9620] RSP: 002b:00007f9ed468bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1476.122766][ T9620] RAX: ffffffffffffffda RBX: 000000000002d040 RCX: 000000000045deb9 [ 1476.130725][ T9620] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1476.138684][ T9620] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 1476.146644][ T9620] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 1476.154619][ T9620] R13: 00007ffd48f6d62f R14: 00007f9ed468c9c0 R15: 000000000118bf2c 00:44:25 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, &(0x7f0000000280)}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0)