0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000000401"], 0x20}}, 0x0) 17:42:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:18 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 17:42:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') read$alg(r0, &(0x7f0000000080)=""/225, 0xe1) [ 1144.552731][T15046] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1144.563468][T15048] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 17:42:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) 17:42:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') read$alg(r0, &(0x7f0000000080)=""/225, 0xe1) 17:42:19 executing program 5: request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) [ 1144.680707][ T35] audit: type=1804 audit(1612460539.040:766): pid=15069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1296/bus" dev="sda1" ino=14347 res=1 errno=0 [ 1144.809839][ T9316] usb 3-1: new high-speed USB device number 114 using dummy_hcd [ 1145.059883][ T9316] usb 3-1: Using ep0 maxpacket: 16 [ 1145.179820][ T9316] usb 3-1: config 0 has an invalid interface number: 60 but max is 0 [ 1145.188144][ T9316] usb 3-1: config 0 has no interface number 0 [ 1145.200493][ T9316] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 1145.215023][ T9316] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has invalid maxpacket 1536, setting to 1024 [ 1145.229172][ T9316] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1145.242382][ T9316] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1145.255218][ T9316] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1145.268198][ T9316] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 1145.281766][ T9316] usb 3-1: New USB device found, idVendor=1608, idProduct=0004, bcdDevice=40.85 [ 1145.294489][ T9316] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1145.306318][ T9316] usb 3-1: config 0 descriptor?? [ 1145.330467][T15043] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1145.350428][ T9316] io_edgeport 3-1:0.60: Edgeport 4 port adapter converter detected [ 1145.358410][ T9316] usb 3-1: detected [ 1145.559790][ T9316] io_edgeport 3-1:0.60: short epic descriptor received: 21 [ 1145.780960][ T9316] usb 3-1: error in getting manufacturer descriptor: -71 [ 1145.801389][ T9316] usb 3-1: error in getting boot descriptor: -71 [ 1145.807987][ T9316] usb 3-1: Device Reported 0 serial ports vs. core thinking we have 4 ports, email greg@kroah.com this information. [ 1145.829907][ T9316] usb 3-1: Direct firmware load for edgeport/down.fw failed with error -2 [ 1145.838435][ T9316] usb 3-1: Failed to load image "edgeport/down.fw" err -2 [ 1145.846463][ T9316] usb 3-1: Direct firmware load for edgeport/boot.fw failed with error -2 [ 1145.855028][ T9316] usb 3-1: Failed to load image "edgeport/boot.fw" err -2 [ 1145.863738][ T9316] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB0 [ 1145.873030][ T9316] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB1 [ 1145.883436][ T9316] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB2 [ 1145.892718][ T9316] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB3 [ 1145.904128][ T9316] usb 3-1: USB disconnect, device number 114 [ 1145.913795][ T9316] edgeport_4 ttyUSB0: Edgeport 4 port adapter converter now disconnected from ttyUSB0 [ 1145.942562][ T9316] edgeport_4 ttyUSB1: Edgeport 4 port adapter converter now disconnected from ttyUSB1 [ 1145.963732][ T9316] edgeport_4 ttyUSB2: Edgeport 4 port adapter converter now disconnected from ttyUSB2 [ 1145.991305][ T9316] edgeport_4 ttyUSB3: Edgeport 4 port adapter converter now disconnected from ttyUSB3 [ 1146.001583][ T9316] io_edgeport 3-1:0.60: device disconnected 17:42:20 executing program 2: r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000053ac69100816040085400000000109022d00010000000009043c0003836fbd0009058d1f00e600000009050502000000000009058f1e"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f00000002c0)={0x0, 0x0, 0x15, "9fce31d98e03cd038cd78be89ba7f356b33ddbcde0"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 17:42:20 executing program 1: r0 = openat$rtc(0xffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 17:42:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect(r0, &(0x7f0000000400)=@un=@abs, 0x80) 17:42:20 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 17:42:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000340)=[{&(0x7f0000000200)=""/120, 0x78}], 0x1, &(0x7f00000009c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 17:42:20 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 17:42:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0xffffffffffffffff) 17:42:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="79938dff90648064a5f3803a9ccf9e", 0xf}], 0x1) ftruncate(r0, 0x200002) sendfile(r0, r1, 0x0, 0x80001d00c0d0) [ 1146.414801][ T35] audit: type=1804 audit(1612460540.771:767): pid=15168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1297/bus" dev="sda1" ino=14322 res=1 errno=0 [ 1146.599780][ T34] usb 3-1: new high-speed USB device number 115 using dummy_hcd [ 1146.849624][ T34] usb 3-1: Using ep0 maxpacket: 16 [ 1146.969826][ T34] usb 3-1: config 0 has an invalid interface number: 60 but max is 0 [ 1146.992957][ T34] usb 3-1: config 0 has no interface number 0 [ 1147.021980][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 1147.053421][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has invalid maxpacket 1536, setting to 1024 [ 1147.077993][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1147.093757][ T34] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1147.107609][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1147.129547][ T34] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 1147.143056][ T34] usb 3-1: New USB device found, idVendor=1608, idProduct=0004, bcdDevice=40.85 [ 1147.156097][ T34] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1147.181280][ T34] usb 3-1: config 0 descriptor?? [ 1147.200477][T15150] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1147.220476][ T34] io_edgeport 3-1:0.60: Edgeport 4 port adapter converter detected [ 1147.228404][ T34] usb 3-1: detected [ 1147.371667][ T35] audit: type=1800 audit(1612460541.731:768): pid=15180 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=14264 res=0 errno=0 [ 1147.392673][ T35] audit: type=1800 audit(1612460541.731:769): pid=15199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=14270 res=0 errno=0 [ 1147.429635][ T34] io_edgeport 3-1:0.60: short epic descriptor received: 21 [ 1147.639559][ T34] usb 3-1: error in getting manufacturer descriptor: -71 [ 1147.659607][ T34] usb 3-1: error in getting boot descriptor: -71 [ 1147.666057][ T34] usb 3-1: Device Reported 0 serial ports vs. core thinking we have 4 ports, email greg@kroah.com this information. [ 1147.680120][ T34] usb 3-1: Direct firmware load for edgeport/down.fw failed with error -2 [ 1147.690233][ T34] usb 3-1: Failed to load image "edgeport/down.fw" err -2 [ 1147.699022][ T34] usb 3-1: Direct firmware load for edgeport/boot.fw failed with error -2 [ 1147.707693][ T34] usb 3-1: Failed to load image "edgeport/boot.fw" err -2 [ 1147.717257][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB0 [ 1147.736196][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB1 [ 1147.761007][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB2 [ 1147.778232][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB3 [ 1147.801593][ T34] usb 3-1: USB disconnect, device number 115 [ 1147.832006][ T34] edgeport_4 ttyUSB0: Edgeport 4 port adapter converter now disconnected from ttyUSB0 [ 1147.858247][ T34] edgeport_4 ttyUSB1: Edgeport 4 port adapter converter now disconnected from ttyUSB1 [ 1147.888970][ T34] edgeport_4 ttyUSB2: Edgeport 4 port adapter converter now disconnected from ttyUSB2 [ 1147.910977][ T34] edgeport_4 ttyUSB3: Edgeport 4 port adapter converter now disconnected from ttyUSB3 [ 1147.922780][ T34] io_edgeport 3-1:0.60: device disconnected 17:42:22 executing program 2: r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000053ac69100816040085400000000109022d00010000000009043c0003836fbd0009058d1f00e600000009050502000000000009058f1e"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f00000002c0)={0x0, 0x0, 0x15, "9fce31d98e03cd038cd78be89ba7f356b33ddbcde0"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 17:42:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, 0x0, 0x0, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:22 executing program 1: r0 = openat$procfs(0xffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000005340)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 17:42:22 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 17:42:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="79938dff90648064a5f3803a9ccf9e", 0xf}], 0x1) ftruncate(r0, 0x200002) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 17:42:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, 0x0, 0x0, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:22 executing program 1: r0 = openat$procfs(0xffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000005340)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 17:42:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, 0x0, 0x0, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:22 executing program 1: r0 = openat$procfs(0xffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000005340)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) [ 1148.292758][ T35] audit: type=1804 audit(1612460542.651:770): pid=15277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1298/bus" dev="sda1" ino=14348 res=1 errno=0 17:42:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100), 0x0, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:22 executing program 1: r0 = openat$procfs(0xffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000005340)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) [ 1148.490008][ T34] usb 3-1: new high-speed USB device number 116 using dummy_hcd [ 1148.740440][ T34] usb 3-1: Using ep0 maxpacket: 16 [ 1148.859846][ T34] usb 3-1: config 0 has an invalid interface number: 60 but max is 0 [ 1148.876019][ T34] usb 3-1: config 0 has no interface number 0 [ 1148.895860][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 1148.924056][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has invalid maxpacket 1536, setting to 1024 [ 1148.959461][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1148.969235][ T34] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1148.987624][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1149.001852][ T34] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 1149.015870][ T34] usb 3-1: New USB device found, idVendor=1608, idProduct=0004, bcdDevice=40.85 [ 1149.028989][ T34] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1149.043813][ T34] usb 3-1: config 0 descriptor?? [ 1149.060289][T15262] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1149.067102][ T35] audit: type=1800 audit(1612460543.421:771): pid=15252 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=14264 res=0 errno=0 [ 1149.100138][ T34] io_edgeport 3-1:0.60: Edgeport 4 port adapter converter detected [ 1149.108136][ T34] usb 3-1: detected [ 1149.319439][ T34] io_edgeport 3-1:0.60: short epic descriptor received: 21 [ 1149.539420][ T34] usb 3-1: error in getting manufacturer descriptor: -71 [ 1149.559455][ T34] usb 3-1: error in getting boot descriptor: -71 [ 1149.565873][ T34] usb 3-1: Device Reported 0 serial ports vs. core thinking we have 4 ports, email greg@kroah.com this information. [ 1149.579976][ T34] usb 3-1: Direct firmware load for edgeport/down.fw failed with error -2 [ 1149.591693][ T34] usb 3-1: Failed to load image "edgeport/down.fw" err -2 [ 1149.598920][ T34] usb 3-1: Direct firmware load for edgeport/boot.fw failed with error -2 [ 1149.608030][ T34] usb 3-1: Failed to load image "edgeport/boot.fw" err -2 [ 1149.616823][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB0 [ 1149.628453][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB1 [ 1149.638601][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB2 [ 1149.650782][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB3 [ 1149.660879][ T34] usb 3-1: USB disconnect, device number 116 [ 1149.672006][ T34] edgeport_4 ttyUSB0: Edgeport 4 port adapter converter now disconnected from ttyUSB0 [ 1149.699140][ T34] edgeport_4 ttyUSB1: Edgeport 4 port adapter converter now disconnected from ttyUSB1 [ 1149.730339][ T34] edgeport_4 ttyUSB2: Edgeport 4 port adapter converter now disconnected from ttyUSB2 [ 1149.754052][ T34] edgeport_4 ttyUSB3: Edgeport 4 port adapter converter now disconnected from ttyUSB3 [ 1149.783097][ T34] io_edgeport 3-1:0.60: device disconnected 17:42:24 executing program 2: r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000053ac69100816040085400000000109022d00010000000009043c0003836fbd0009058d1f00e600000009050502000000000009058f1e"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f00000002c0)={0x0, 0x0, 0x17, "9fce31d98e03cd038cd78be89ba7f356b33ddbcde093d4"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 17:42:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100), 0x0, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="79938dff90648064a5f3803a9ccf9e", 0xf}], 0x1) ftruncate(r0, 0x200002) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 17:42:24 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 17:42:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="79938dff90648064a5f3803a9ccf9e", 0xf}], 0x1) ftruncate(r0, 0x200002) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 17:42:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100), 0x0, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) [ 1150.187493][ T35] audit: type=1804 audit(1612460544.541:772): pid=15380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1299/bus" dev="sda1" ino=14351 res=1 errno=0 17:42:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="79938dff90648064a5f3803a9ccf9e", 0xf}], 0x1) ftruncate(r0, 0x200002) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 17:42:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0xb0000004}) [ 1150.370152][ T34] usb 3-1: new high-speed USB device number 117 using dummy_hcd 17:42:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000180)={0xb0000004}) [ 1150.619321][ T34] usb 3-1: Using ep0 maxpacket: 16 [ 1150.739371][ T34] usb 3-1: config 0 has an invalid interface number: 60 but max is 0 [ 1150.748549][ T34] usb 3-1: config 0 has no interface number 0 [ 1150.775931][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 1150.792893][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has invalid maxpacket 1536, setting to 1024 [ 1150.827205][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1150.857803][ T34] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1150.883064][ T34] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1150.897066][ T34] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 1150.916253][ T34] usb 3-1: New USB device found, idVendor=1608, idProduct=0004, bcdDevice=40.85 [ 1150.916308][ T35] audit: type=1800 audit(1612460545.271:773): pid=15356 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=14264 res=0 errno=0 [ 1150.933988][ T34] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1150.958508][ T34] usb 3-1: config 0 descriptor?? [ 1150.990741][T15361] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1151.010284][ T34] io_edgeport 3-1:0.60: Edgeport 4 port adapter converter detected [ 1151.019945][ T34] usb 3-1: detected [ 1151.239241][ T34] io_edgeport 3-1:0.60: short epic descriptor received: 23 [ 1151.459234][ T34] usb 3-1: error in getting manufacturer descriptor: -71 [ 1151.479223][ T34] usb 3-1: error in getting boot descriptor: -71 [ 1151.485599][ T34] usb 3-1: Device Reported 0 serial ports vs. core thinking we have 4 ports, email greg@kroah.com this information. [ 1151.499970][ T34] usb 3-1: Direct firmware load for edgeport/down.fw failed with error -2 [ 1151.510075][ T34] usb 3-1: Failed to load image "edgeport/down.fw" err -2 [ 1151.517315][ T34] usb 3-1: Direct firmware load for edgeport/boot.fw failed with error -2 [ 1151.526083][ T34] usb 3-1: Failed to load image "edgeport/boot.fw" err -2 [ 1151.533713][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB0 [ 1151.543402][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB1 [ 1151.553426][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB2 [ 1151.563892][ T34] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB3 [ 1151.574573][ T34] usb 3-1: USB disconnect, device number 117 [ 1151.583927][ T34] edgeport_4 ttyUSB0: Edgeport 4 port adapter converter now disconnected from ttyUSB0 [ 1151.598037][ T34] edgeport_4 ttyUSB1: Edgeport 4 port adapter converter now disconnected from ttyUSB1 [ 1151.621019][ T34] edgeport_4 ttyUSB2: Edgeport 4 port adapter converter now disconnected from ttyUSB2 [ 1151.658057][ T34] edgeport_4 ttyUSB3: Edgeport 4 port adapter converter now disconnected from ttyUSB3 [ 1151.677490][ T34] io_edgeport 3-1:0.60: device disconnected 17:42:26 executing program 2: r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000053ac69100816040085400000000109022d00010000000009043c0003836fbd0009058d1f00e600000009050502000000000009058f1e"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f00000002c0)={0x0, 0x0, 0x17, "9fce31d98e03cd038cd78be89ba7f356b33ddbcde093d4"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 17:42:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="79938dff90648064a5f3803a9ccf9e", 0xf}], 0x1) ftruncate(r0, 0x200002) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 17:42:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 17:42:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="79938dff90648064a5f3803a9ccf9e", 0xf}], 0x1) ftruncate(r0, 0x200002) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 17:42:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7f, 0x880) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0xa, 0xa, 0x4, "fa8a45310b6d5cb5618035456e440639d4b0767d07693df20b213c15a3212dfffe3bc11ef8f36e04d46bdbf8036f290d5498c839b9eedea028f3481651027bc8", "92731c9bb35d3fe5ecf7bee18eb2c7546b798dbdc2c66861025fc0b476320821", [0x15, 0x4]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 17:42:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) 17:42:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) [ 1152.088099][ T35] audit: type=1804 audit(1612460546.441:774): pid=15480 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1300/bus" dev="sda1" ino=14335 res=1 errno=0 17:42:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) 17:42:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) 17:42:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) [ 1152.279147][T10422] usb 3-1: new high-speed USB device number 118 using dummy_hcd [ 1152.559096][T10422] usb 3-1: Using ep0 maxpacket: 16 [ 1152.699437][T10422] usb 3-1: config 0 has an invalid interface number: 60 but max is 0 [ 1152.707685][T10422] usb 3-1: config 0 has no interface number 0 [ 1152.729085][T10422] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 1152.749071][T10422] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has invalid maxpacket 1536, setting to 1024 [ 1152.769070][T10422] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1152.778812][T10422] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1152.790408][T10422] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1152.800376][T10422] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 1152.810561][T10422] usb 3-1: New USB device found, idVendor=1608, idProduct=0004, bcdDevice=40.85 [ 1152.819753][T10422] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1152.839875][T10422] usb 3-1: config 0 descriptor?? [ 1152.859797][T15471] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1152.877497][ T35] audit: type=1800 audit(1612460547.231:775): pid=15468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=14264 res=0 errno=0 [ 1152.899922][T10422] io_edgeport 3-1:0.60: Edgeport 4 port adapter converter detected [ 1152.908942][T10422] usb 3-1: detected [ 1153.109108][T10422] io_edgeport 3-1:0.60: short epic descriptor received: 23 [ 1153.319018][T10422] usb 3-1: error in getting manufacturer descriptor: -71 [ 1153.339042][T10422] usb 3-1: error in getting boot descriptor: -71 [ 1153.345444][T10422] usb 3-1: Device Reported 0 serial ports vs. core thinking we have 4 ports, email greg@kroah.com this information. [ 1153.369130][T10422] usb 3-1: Direct firmware load for edgeport/down.fw failed with error -2 [ 1153.377656][T10422] usb 3-1: Failed to load image "edgeport/down.fw" err -2 [ 1153.385040][T10422] usb 3-1: Direct firmware load for edgeport/boot.fw failed with error -2 [ 1153.393899][T10422] usb 3-1: Failed to load image "edgeport/boot.fw" err -2 [ 1153.403171][T10422] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB0 [ 1153.421298][T10422] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB1 [ 1153.433260][T10422] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB2 [ 1153.451161][T10422] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB3 [ 1153.486387][T10422] usb 3-1: USB disconnect, device number 118 [ 1153.514593][T10422] edgeport_4 ttyUSB0: Edgeport 4 port adapter converter now disconnected from ttyUSB0 [ 1153.549244][T10422] edgeport_4 ttyUSB1: Edgeport 4 port adapter converter now disconnected from ttyUSB1 [ 1153.577059][T10422] edgeport_4 ttyUSB2: Edgeport 4 port adapter converter now disconnected from ttyUSB2 [ 1153.594356][T10422] edgeport_4 ttyUSB3: Edgeport 4 port adapter converter now disconnected from ttyUSB3 [ 1153.606040][T10422] io_edgeport 3-1:0.60: device disconnected 17:42:28 executing program 2: r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000053ac69100816040085400000000109022d00010000000009043c0003836fbd0009058d1f00e600000009050502000000000009058f1e"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f00000002c0)={0x0, 0x0, 0x17, "9fce31d98e03cd038cd78be89ba7f356b33ddbcde093d4"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 17:42:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) 17:42:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) 17:42:28 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000180)={0xb0000004}) 17:42:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) 17:42:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) 17:42:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x1000) 17:42:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0xb, 0x4) 17:42:28 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x0, @desc2='\xe3U\xa7j\x11\xa1\xbe\x18'}) [ 1153.976459][ T35] audit: type=1804 audit(1612460548.331:776): pid=15576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1301/bus" dev="sda1" ino=14321 res=1 errno=0 17:42:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='trusted.overlay.upper\x00', 0x0, 0xd8, 0x1) chroot(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_open_dev$vcsn(0x0, 0x0, 0x30000) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000001140), 0x80000) [ 1154.045091][ T35] audit: type=1804 audit(1612460548.381:777): pid=15580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir968551550/syzkaller.J9MhpQ/1073/bus" dev="sda1" ino=14348 res=1 errno=0 17:42:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) [ 1154.179431][T10422] usb 3-1: new high-speed USB device number 119 using dummy_hcd [ 1154.438915][T10422] usb 3-1: Using ep0 maxpacket: 16 [ 1154.568929][T10422] usb 3-1: config 0 has an invalid interface number: 60 but max is 0 [ 1154.577113][T10422] usb 3-1: config 0 has no interface number 0 [ 1154.583212][T10422] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 1154.594203][T10422] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8D has invalid maxpacket 1536, setting to 1024 [ 1154.605504][T10422] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1154.616275][T10422] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1154.626073][T10422] usb 3-1: config 0 interface 60 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1154.635949][T10422] usb 3-1: config 0 interface 60 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 1154.647011][T10422] usb 3-1: New USB device found, idVendor=1608, idProduct=0004, bcdDevice=40.85 [ 1154.656139][T10422] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1154.665905][T10422] usb 3-1: config 0 descriptor?? [ 1154.691041][T15557] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1154.711162][T10422] io_edgeport 3-1:0.60: Edgeport 4 port adapter converter detected [ 1154.748880][T10422] usb 3-1: detected [ 1154.853826][ T35] audit: type=1804 audit(1612460549.211:778): pid=15583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir968551550/syzkaller.J9MhpQ/1073/bus" dev="sda1" ino=14348 res=1 errno=0 [ 1154.918887][T10422] io_edgeport 3-1:0.60: short epic descriptor received: 23 [ 1154.935722][ T35] audit: type=1800 audit(1612460549.291:779): pid=15583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=14348 res=0 errno=0 [ 1155.128855][T10422] usb 3-1: error in getting manufacturer descriptor: -71 [ 1155.148877][T10422] usb 3-1: error in getting boot descriptor: -71 [ 1155.155229][T10422] usb 3-1: Device Reported 0 serial ports vs. core thinking we have 4 ports, email greg@kroah.com this information. [ 1155.169407][T10422] usb 3-1: Direct firmware load for edgeport/down.fw failed with error -2 [ 1155.179642][T10422] usb 3-1: Failed to load image "edgeport/down.fw" err -2 [ 1155.187466][T10422] usb 3-1: Direct firmware load for edgeport/boot.fw failed with error -2 [ 1155.196327][T10422] usb 3-1: Failed to load image "edgeport/boot.fw" err -2 [ 1155.207123][T10422] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB0 [ 1155.226191][T10422] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB1 [ 1155.244916][T10422] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB2 [ 1155.271237][T10422] usb 3-1: Edgeport 4 port adapter converter now attached to ttyUSB3 [ 1155.290483][T10422] usb 3-1: USB disconnect, device number 119 [ 1155.309113][T10422] edgeport_4 ttyUSB0: Edgeport 4 port adapter converter now disconnected from ttyUSB0 [ 1155.334761][T10422] edgeport_4 ttyUSB1: Edgeport 4 port adapter converter now disconnected from ttyUSB1 [ 1155.346874][T10422] edgeport_4 ttyUSB2: Edgeport 4 port adapter converter now disconnected from ttyUSB2 [ 1155.366259][T10422] edgeport_4 ttyUSB3: Edgeport 4 port adapter converter now disconnected from ttyUSB3 [ 1155.379471][T10422] io_edgeport 3-1:0.60: device disconnected 17:42:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x0, @desc2='\xe3U\xa7j\x11\xa1\xbe\x18'}) 17:42:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) 17:42:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0xb0000004}) 17:42:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:30 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x0, @desc2='\xe3U\xa7j\x11\xa1\xbe\x18'}) [ 1155.671935][ T35] audit: type=1804 audit(1612460550.032:780): pid=15649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1222/bus" dev="sda1" ino=14344 res=1 errno=0 17:42:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000001140)={0x0, 0x80000001, 0x0, 0x0, 0x2, [{}, {}]}) [ 1155.768551][ T35] audit: type=1804 audit(1612460550.062:781): pid=15646 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir968551550/syzkaller.J9MhpQ/1074/bus" dev="sda1" ino=14347 res=1 errno=0 [ 1155.825161][ T35] audit: type=1804 audit(1612460550.172:782): pid=15655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1302/bus" dev="sda1" ino=14354 res=1 errno=0 17:42:30 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:30 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:30 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x0, @desc2='\xe3U\xa7j\x11\xa1\xbe\x18'}) 17:42:30 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0xb0000004}) 17:42:30 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x0, @desc2='\xe3U\xa7j\x11\xa1\xbe\x18'}) 17:42:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:31 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) [ 1156.754885][ T35] audit: type=1804 audit(1612460551.112:783): pid=15695 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1223/bus" dev="sda1" ino=14325 res=1 errno=0 17:42:31 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:31 executing program 0: r0 = socket$inet(0x2, 0x3, 0xe0) setsockopt$inet_mreqn(r0, 0x0, 0x7, 0x0, 0x0) 17:42:31 executing program 0: r0 = getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) unlinkat(0xffffffffffffffff, 0x0, 0x0) 17:42:31 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r0, 0x0, 0x3) 17:42:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x0, @desc2='\xe3U\xa7j\x11\xa1\xbe\x18'}) 17:42:32 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) unlink(&(0x7f0000000180)='./file0\x00') 17:42:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, 0x0, &(0x7f0000000140)) 17:42:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0xb0000004}) 17:42:32 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x0, @desc2='\xe3U\xa7j\x11\xa1\xbe\x18'}) 17:42:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, 0x0) [ 1157.656065][T15722] loop5: detected capacity change from 264192 to 0 [ 1157.692603][T15722] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 17:42:32 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 1157.715640][ T35] kauditd_printk_skb: 2 callbacks suppressed [ 1157.715651][ T35] audit: type=1800 audit(1612460552.072:786): pid=15722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=49 res=0 errno=0 [ 1157.772721][ T35] audit: type=1804 audit(1612460552.132:787): pid=15740 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1304/bus" dev="sda1" ino=14340 res=1 errno=0 [ 1157.818130][ T35] audit: type=1804 audit(1612460552.132:788): pid=15739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir968551550/syzkaller.J9MhpQ/1076/bus" dev="sda1" ino=14341 res=1 errno=0 17:42:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, &(0x7f0000000000)) [ 1157.851866][ T35] audit: type=1800 audit(1612460552.172:789): pid=15738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=50 res=0 errno=0 [ 1157.890585][ T3412] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1157.906584][ T35] audit: type=1804 audit(1612460552.172:790): pid=15741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1224/bus" dev="sda1" ino=14344 res=1 errno=0 17:42:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000440)=0x5e, 0x4) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@can_delroute={0x14, 0x19, 0x1}, 0x14}}, 0x0) 17:42:32 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000080)={0x0, "73630905714467cf5e586ae3d070f17c36dec308ded313ca70f41b088e7561aaa72841bfd3f9620ee9766c0b8249f6294f526b0cedf02c0c6d948d6789137f84"}, 0x48, 0xffffffffffffffff) keyctl$read(0xb, r0, 0x0, 0x0) 17:42:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e0e2ffd548"], 0x10) 17:42:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed5869847e39ea1094178da7ffff4100000010000000000800ebff", 0x1b, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 17:42:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 17:42:33 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') 17:42:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 17:42:33 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 17:42:33 executing program 5: request_key(0x0, 0x0, &(0x7f0000000080)='\x0354\x1c\'\xfdl\xac\x84\x82NJ\xac\x14.\x00'/28, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x21) open(0x0, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x25) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x0) open$dir(0x0, 0x218201, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20008008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x8) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000140)=0x9, 0x4) mmap(&(0x7f0000ff6000/0x1000)=nil, 0x1000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x30) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffa) 17:42:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000080)={0x0, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) [ 1158.816753][T15782] loop2: detected capacity change from 4096 to 0 [ 1158.835136][T15782] EXT4-fs error (device loop2): ext4_fill_super:4943: inode #2: comm syz-executor.2: iget: bogus i_mode (54355) 17:42:33 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 1158.852417][ T35] audit: type=1804 audit(1612460553.212:791): pid=15786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1305/bus" dev="sda1" ino=14344 res=1 errno=0 [ 1158.868870][T15782] EXT4-fs (loop2): get root inode failed [ 1158.933426][T15782] EXT4-fs (loop2): mount failed [ 1158.992485][T15782] loop2: detected capacity change from 4096 to 0 [ 1159.019575][T15782] EXT4-fs error (device loop2): ext4_fill_super:4943: inode #2: comm syz-executor.2: iget: bogus i_mode (54355) 17:42:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000240)) [ 1159.042939][T15782] EXT4-fs (loop2): get root inode failed [ 1159.057887][T15782] EXT4-fs (loop2): mount failed 17:42:33 executing program 2: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x888401) 17:42:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x0, 0x0, 0x0, 0x9}, 0x10) 17:42:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) [ 1159.253685][T15813] loop2: detected capacity change from 270 to 0 17:42:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 17:42:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) [ 1159.549928][T15822] loop2: detected capacity change from 270 to 0 17:42:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:33 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 17:42:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) 17:42:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="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", 0x10) sendfile(r0, r1, 0x0, 0x10000) [ 1159.717957][T15840] loop2: detected capacity change from 270 to 0 [ 1159.735887][T15844] loop5: detected capacity change from 512 to 0 17:42:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) [ 1159.760036][T15844] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1159.805712][ T35] audit: type=1804 audit(1612460554.162:792): pid=15844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir523420103/syzkaller.gkYH5t/1270/file0/file0" dev="loop5" ino=17 res=1 errno=0 17:42:34 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 1159.896896][ T35] audit: type=1804 audit(1612460554.202:793): pid=15856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1306/bus" dev="sda1" ino=14323 res=1 errno=0 [ 1159.922442][ T35] audit: type=1804 audit(1612460554.202:794): pid=15844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir523420103/syzkaller.gkYH5t/1270/file0/file0" dev="loop5" ino=17 res=1 errno=0 [ 1159.965014][T15862] loop2: detected capacity change from 270 to 0 17:42:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="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", 0x10) sendfile(r0, r1, 0x0, 0x10000) [ 1160.106445][ T35] audit: type=1804 audit(1612460554.382:795): pid=15844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir523420103/syzkaller.gkYH5t/1270/file0/file0" dev="loop5" ino=17 res=1 errno=0 17:42:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f", 0x10) sendfile(r0, r1, 0x0, 0x10000) 17:42:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) 17:42:34 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 1160.434913][T15872] loop2: detected capacity change from 512 to 0 [ 1160.632998][T15872] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1160.646748][T15880] loop5: detected capacity change from 512 to 0 [ 1160.679185][T15880] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:42:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f", 0x10) sendfile(r0, r1, 0x0, 0x10000) 17:42:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="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", 0x10) sendfile(r0, r1, 0x0, 0x10000) 17:42:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:35 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 1160.879855][T15894] loop2: detected capacity change from 512 to 0 [ 1160.937851][T15894] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1160.960715][T15902] loop5: detected capacity change from 512 to 0 17:42:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f", 0x10) sendfile(r0, r1, 0x0, 0x10000) 17:42:35 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 1161.025497][T15902] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:42:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="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", 0x10) sendfile(r0, r1, 0x0, 0x10000) [ 1161.134544][T15917] loop2: detected capacity change from 512 to 0 [ 1161.158751][T15917] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1161.159248][T15925] loop5: detected capacity change from 512 to 0 [ 1161.190398][T15925] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:42:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "b06dc21719a73f23e3efc0db3d187066f38f5ceff19eba0f4df959d5cda9a5e134cc6b961644c42d5aeb8d75598315419fb847066dc106572951cc0e236c87c532f72ced46a98c9a18b3c7bea144f252d0e49d98fe0ab5ea388ab9ff66da8b425b4d967beffdeb1f9f7b6691d3746eb51a3605de05e30f9cda5b367d09b078a4eee8292d2caea0e00c5318de2ea273fcade163245c090741e88b1cb40c1b6fa9af84e487ddf80f2964fa95bf4cdac1c39b29883280aaa6a4f1879e055da7093c0e94277d90dd2d17de2a005a06e2d815ba33dad1a0eed60bdd40505feb4965fa609aa97ee51fdc5a7a26bdaa34887b11e92272cbc8710a7f1acd91e253e5320357fcc00a7b0301f0fa86cc2d6f2e76bd71cd06b916076e349abaeacb1799da1daa0b448c68dd3e247ded629cb225984a6b6987c52c0bd38539b6b994484d6ac5e3f8e0e5b2e3edee4c29fe1d641918f7cd528ac13d3043991c7ce74f28a01e551a17a463de01d02c03ec7bdf18a5262b81b9f47511d05b1f8c020a1b52fd82a4eb2444849fbdc60ad67c2a0433bbaf34ba83f919483c4e72c32f3d0c9c0e7087adcabe5466dda719f6824b6f1c05bdabaa53750855a8fd156146ae075840e0bbca19855bf31b48f0e6471810103f036b383da394590dbbb8aa8711a9b78c6d2c88087511d322ad123859bea3b743a90ce65ba2f08dab8bd0bf949001b7730f9566cf74a7e81167f50990d16253778a282ab4926df9d609a6e8dc03f69165da5f5c0d6227e1869ecea806c0525f3168e37a0d5acbad31495b25f79d7ea118d74f20c6132a68cc2df1defd340ee8f074d8c971a7f6737eab129b1e594b3591e5c864906aa4687c542789dd572567980612e57707950198101e265dc24889be875bf7ed4f0ab9d6fdb60b1a78639e673f225d332ab145a515f05ba28b4e70bb80e22be7713fc3d4d666268bedde518e60416c4b63bd5e1cc8e0a4b082b149a84818f840cf640640c79c90c8d8827bc6f6fbf2d0f78a3e02b7224c1dc422c189e3f154616acf43f9eec80bc3653f4c2a881b0eeb2dd21adb63959e550dcbbf26ed5991cae280e89dd5f0ca5454dcdc7836abbeee02f5518fb6587ca8952e0a5cb399bd5132224b27ede8d1e8370ad9697b959237df0316b7927b0ff866ac9cc42cc97e238c40eb898bc381e2a2d1071c29c0719291dc9c724b48bf70e087f31af4ccd48a7c22fa756fa699674cc87aac4f56966a4981abd7b0eee173a96fbf41b6b11d2904707240bc8d0b88f9756d2109f3c47fb27c168d5c376cc5aec0b1092d221b3d18dc943394611a5ac0ef6789b24e35b5a9ae6f076ef3e30eda167f70e47b5910ae42be2f49cccd1f8f9b5770d4c9d1edb6e035615f549f9ae32b7ffe6ae11f36549748050d8e9f7721f8dd70bd9e744d7bb30b916cb1f748d0014dbdb235e6cc4094afc2f45a18eac42ad07cd197ac06d33728e5b33737795cac1dbc3400c44349f5109a7f9ca094b8a56e0dc8ecd660e68b3006df986fe292ee964796039e0848b325c4cacbd5ce9c1df046d1132420141aeb77594a5712e4594516b29090e53979ed046755d890d233fe7e431e8067f775f9041c57829c5edd2d550bac64f9922b0849a658f5a1c608a1282530bf78f5b1a1bb9ce185a8079b8d447129b9d7aa1a48447f3a35a0d397b126e1f794c2348c5b4046308073a5f6814c5216df9f59122bc42ef7d03a3341ae8582c9f260a5b0dacf4d6f2990671859dfcbcbb621f870b732186a6f17fe8292be21c81449e89a3d5df569312ac591b35d53e886e68d3e87e2f8923ce527218faefe1f8149899fb077a3980a9b9c0ed21894cad77b6bd977f08243ff0ffbd77313b726d1bbcd87f8c8bdccb965b6792e52fe1c4e413029851ecfeb5cd522de191e62a4efccda638e88596821e3995b44dd9f62de07a1fdb8c168239facefc0d17bc1707e92da8b09a45ce4fd6ebedd8fb1170070b28a439de6edee40baa63847a8ea9ee343fca8e29ac5b6515b4e62cdcdf1a3544cb8e13a2d7f1ec4277a0eb8b704e2bb4bb3468d948c3eaa1528c6b1a6f2b68110e42f02cae6df98cc3b20a2d0a3e881292005e9dcb20f6b79aaf2836537a0f3f6d018f1975d59f82305d43a62d38f4b699e0efe136a84301ed8af8cc0e13c062c257dcdd1bf10c3f1192d1b65ac889e3094fd45f6d6dba016fba6917429572f2f8c48cef94371b79a36f47fa6e266b88e5ca03bd74421dee33a7ad6def4d75d2553168d05565d43da5d93eaecf1736ac9f43cbbf1cfc6332cd66f9bcc5449712f60892683e37252e50d6ad715744b69b13fcae36bf99f9cfb580c7d067c85b3c888eb268840fd78b6132cea589eed61573eba497d7f5cd1d2a93c7fddac89a62cf6216dac669b84ed793ea89ee116c46967a4589478d730a881bf246a4795c8f5c5a14af4e965ce7d492644f4c5731d7986dd331e22697bf6aa6975ae7c07e21454294f9035a7b131824b1aa895f718e8a871d38d79e201ffbe9218ab8c8c67f583e6537d4d9f2503b58ad56db776ff3ab981bd13023f8369e79a7a6d7c8b27f842c0c174eda616d457aa2c143d1cb7d5e066171c696c011eb28fd34a729987b0ff13d35342b439dc66cd39f8a6092046bf9073836e8787086c11f13dd47759f7087c1fb3840cac5b4d661d9aebd593face1100c91bed0deef4df836ce04cc7d48ab6ba65aff8af98d3cc20352d4d41815080b3e455f9622f30427fe974ec2f9281c3d91868db32f3b1c35be1829c55808f84aac715877e1e48bd1b4701bf1d65662065c0b817831f69533be5dac528a381ce45a7d8e6d38d5ad9d85cf53526a8bc23c4200d6224222ef112604d604adebd36c314468603ff944f180c4bea43d0c9e29f53ab3e0a7c0e76491d8e48d81b3c107bdfbcf8b54dc96730c8243986e46abb4ba4f39a0cbf898a6b1d56feb448fd2b9c73835920c0c7db0f64b4301388edd1fe7475628f07f3edf2a6dabe0225bffd263dd872d2128bf28d1a34ac3646c38c6232933279a13687779dc672a7eef44e72f58f2522a702dfda47f11b051f429d0a433bd38844e2738665d298db2475c68eff878ddcea12aaaa150c8a729498dd860a4198d4c0c31a2e705ddfb623ce3cb5a8df9b0708624d8faf2bf3cbb60ab5088d39686c8b8820d390936b705c2f4a8c5f605513dc2be659b76a8e8db08fa85785a4519ce7ba4531774a578d646206a0447dde35cd5fadcebfeaf38c40ff2ae329b0ca747c3e3ceef9220f53ab742277172adbe78b3c32e090b2573e9ebc870565458a76fe740e5bf53b41b20dc19eda6e0e6f90b629ff39e824381209724cbcd11b348aa20be283a55bcd19bbfac15e785677624d990b997f3342b3860c127b74ddfe75879d6060459034e7efc781a06472169b603bb0f5f329ee6ae9afb5c25f9ba5f97a522ff41863a9f0e58659ba73b03cf23ad4b6bef9fe5949da384819d0b3c06942b74ba2501e2cd031250b60f591c8a140d1b55803e8b7d6be9fedf03ab48bf7556f80e77b85beed9ac70a7f247b4756616b0b8cb3dc5b40fb13eaaf3b580fede7a84c1c8604ac10dd30428cac7f0781cc2a392ea66379e90e283b1f081fb0d2e690ba8f505b40741bc5a9f1f9b02ee8bc395984f0b93f75bacbdae32f2eadfa50de7717bb56dafbc06c022fde4b1817d0d74d6a512b62ea6f3086bfe8d03291bfa73b6086486e16d040366102581e341ef224eecf8f9f9ee29e991409b661f370c3e32827c70b5df09687f2376d924c3feece28847e171851ab132593fe7ed624eba7cd4cf2de3768154b2946b9bc66c0566193a9497732deb684cd2fd54043e528c65c98b7017f08d85e86f14285d3f4344566d7fc547294be873ef3270b6ad7c848531e768fa6cb0d11e27f5fd733fa354ac7d8968add3038d24ebaf7038b39d5f2715e4cb780b5c1a1ea37c834f9ff91526128117741a8bab74ccd4553c744e759a98c851a9db84bdee4ffa427b935331f6aba4327f77ed1cd372b611db971dd0ce9185c2a9ca404573a4384428a2637372e824ae38a8a68c487d32fe800d11609c4b4a9b9c64d76d1ca3cc605fff16d76fb4b7ad5ae16fa235f11cccc9a725be11e10dfe34a130515b03fe59dec2fa2a474db7e06a91a779ced37c2e391c04e4ac464c63124daef868134038f34ff24248ff18505e7a9b4d11d447b435e71a2d907ef7662322ca015fd24a7378dddf1c14690da6b878c1b54d363efb80d7055958bf70be3443a155febb00ac26ba687bd3c7c0ce1795580d0717e255952862929632b8187706389f246fff7ea3e5fef93eb70b89692b8fddb719df73277b14b33a37f55e2a966b41bacde96e69398fa405c91435bd83ca53b18998b9c7c28b51a9af07931c2be8950f1b272b77f257c69c0c6749c25af8fb49292527129327253be332f5bc1bbcdf47007dbb1b52a0b45af282e92c7ef8996daeaed99ec90acfdc6568beef173c0eb1c103fb589d4cce0d1d750549e16eee845dfece0edcba7ba60cab57ac6161ca67a3850dab4690eb99cefc6b0a15561ae6e5266944fdc3b85aad85f9cd527df16d47563af62519691a9978e1445d1c6b51eb3859ba851c119e90e9c385b1e140d8c40f63bf7fb3e7e19090f2434f04d3bf3ea2fe0e7574d540a2f5b43498fa1aa162a3a8c19a8e7bdd2aca2b36526e857221c3f3bd066264c2ca371389e6a1783cdb423ca27acf7b20a9fd4c87668edf30ed3e900bd5ce14d5ed221e927e64e88bb7871bf96b2737df3317a5661fa91d80be9b5fef15517eec80d7ef452e75079eb5bc64c71ba85d47ccfaa70047c731ac2b65aa2f69d84b4d13442cb4a12cd6d957f12a6ce20b017b80a7e826dc341f7167e2ef92766e0b6f82e01ecf9a36d282bc92276062503d53caaae40042edaa47aaa2151acca72d26d45a88dfd17272beb35586686bc5236d024ad0eb2cf4b3f27a142fd22be32b4a1887ad9284ae777f4045072cb4af635f468144552d3ba01454f2387fc454602"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="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", 0x10) sendfile(r0, r1, 0x0, 0x10000) 17:42:35 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 17:42:35 executing program 2: readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') syz_genetlink_get_family_id$netlbl_cipso(0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:42:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) 17:42:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="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", 0x10) sendfile(r0, r1, 0x0, 0x10000) [ 1161.801423][T15945] loop2: detected capacity change from 270 to 0 [ 1161.892004][T15947] loop5: detected capacity change from 512 to 0 [ 1162.018845][T15947] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:42:36 executing program 1: getpid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_genetlink_get_family_id$netlbl_cipso(0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:42:36 executing program 2: readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') syz_genetlink_get_family_id$netlbl_cipso(0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:42:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000001700)={0x0, 0xfb, 0xe01, 0x0, 0x0, "a8276d048dae168eccc825add12f4d18", "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"}, 0xe01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f", 0x10) sendfile(r0, r1, 0x0, 0x10000) [ 1162.229311][T15963] loop1: detected capacity change from 270 to 0 [ 1162.266881][T15967] loop2: detected capacity change from 270 to 0 17:42:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @local}, {0x2, 0x0, @loopback}, 0x184, 0x0, 0x0, 0x0, 0xfffa}) 17:42:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000080)=""/131, &(0x7f0000000140)=0x83) [ 1162.338200][T15977] loop5: detected capacity change from 512 to 0 17:42:36 executing program 1: request_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='85baa174f0cb1142', 0xfffffffffffffffb) 17:42:36 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0x0, 0x4, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "634591e3"}, 0x0, 0x0, @userptr}) [ 1162.423165][T15977] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:42:36 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 17:42:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 17:42:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) 17:42:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[], 0x10) 17:42:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@multicast2, @dev={0xac, 0x14, 0x14, 0x3e}}, 0xc) 17:42:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r0, 0x0, 0x0, 0x80800) 17:42:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006100), 0x49f, 0x0, 0x0) 17:42:37 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x3, 0x0, &(0x7f0000000280)) 17:42:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r0, 0x0, 0x0, 0x80800) 17:42:37 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 17:42:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r0, 0x0, 0x0, 0x80800) 17:42:37 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, 0x0) 17:42:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r0, 0x0, 0x0, 0x80800) 17:42:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x3f7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) 17:42:38 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f0000000200)="37b9", 0x2}], 0x2) 17:42:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 17:42:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x10) [ 1163.700866][T16040] new mount options do not match the existing superblock, will be ignored [ 1163.766110][T16040] new mount options do not match the existing superblock, will be ignored [ 1163.957451][ T35] kauditd_printk_skb: 20 callbacks suppressed [ 1163.957464][ T35] audit: type=1804 audit(1612460558.312:816): pid=16057 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1309/bus" dev="sda1" ino=14327 res=1 errno=0 17:42:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 17:42:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 17:42:39 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f0000000200)="37b9", 0x2}], 0x2) 17:42:39 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}, 0x3, 0x0, 0x0, 0x1}}, 0x26) 17:42:39 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000006240)) 17:42:39 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default}) [ 1164.786416][T16062] new mount options do not match the existing superblock, will be ignored 17:42:39 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f0000000200)="37b9", 0x2}], 0x2) 17:42:39 executing program 0: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 17:42:39 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e8, 0x0) 17:42:39 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:42:39 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f0000000200)="37b9", 0x2}], 0x2) [ 1164.871487][T16075] new mount options do not match the existing superblock, will be ignored [ 1164.951082][T16089] new mount options do not match the existing superblock, will be ignored [ 1164.976024][ T35] audit: type=1804 audit(1612460559.332:817): pid=16090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1310/bus" dev="sda1" ino=14328 res=1 errno=0 17:42:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r7, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:40 executing program 5: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x4000) 17:42:40 executing program 0: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 17:42:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x7a, 0x0, &(0x7f0000000180)) 17:42:40 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f00000013c0)='IPVS\x00') 17:42:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{0x0}, {0x0}, {&(0x7f00000001c0)='O', 0x1}], 0x3}], 0x1, 0x0) 17:42:40 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000002a40)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$link(0x8, r1, r2) 17:42:40 executing program 0: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 17:42:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000180)=0x7, 0x4) 17:42:40 executing program 3: sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ppoll(&(0x7f00000002c0)=[{r1}, {r0, 0x42}], 0x2, 0x0, 0x0, 0x0) 17:42:40 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r0, r1) 17:42:40 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ppoll(&(0x7f00000002c0)=[{r1}, {r0, 0x42}], 0x2, 0x0, 0x0, 0x0) [ 1165.940544][ T35] audit: type=1804 audit(1612460560.303:818): pid=16132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1311/bus" dev="sda1" ino=14321 res=1 errno=0 17:42:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000004000)={0x0, 0x0, &(0x7f0000003fc0)={&(0x7f00000000c0)={0x14, 0xd, 0xa, 0x101}, 0x14}}, 0x0) 17:42:41 executing program 0: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 17:42:41 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000040)={@local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x10, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_ra}}}}}, 0x0) 17:42:41 executing program 1: readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', &(0x7f0000000040)=""/33, 0x21) 17:42:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:41 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f0000000280)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000340)={0x0, "1d85808930b63c22f113d9fc006587bb9ffeee90080ebb9d23fb98561acd2f3bba7b85fa1cb6ac346d1ceb55cd818e9def233452207373f7d075446186c6bb0c"}, 0x48, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, 0x0, 0x0) 17:42:41 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, 0x0, 0x0) 17:42:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:41 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffff8, 0x693d6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x24, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x3, 0x1, 0x1f, 0x0, 0x1, 0x800, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb7, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x160a0, 0x0, 0x1, 0x0, 0x7f, 0x5, 0x800}, 0x0, 0xf, r2, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) fallocate(0xffffffffffffffff, 0x13, 0x0, 0x2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r3, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000240) 17:42:41 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f0000000080), &(0x7f0000000040)=0x4) 17:42:41 executing program 2: io_setup(0x5, &(0x7f00000004c0)=0x0) io_destroy(r0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 17:42:41 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000000)={0x3, @bcast, 0xffffffffffffffff}) [ 1166.906461][ T35] audit: type=1804 audit(1612460561.263:819): pid=16168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1312/bus" dev="sda1" ino=14336 res=1 errno=0 17:42:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}], 0x1, 0x0) 17:42:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4}, 0xc) 17:42:41 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x7, 0xc, 0x81, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00c642d, &(0x7f0000000100)={r1}) 17:42:42 executing program 3: sched_yield() syz_open_dev$dri(0x0, 0x7, 0x0) sched_yield() ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ptrace$getenv(0x4201, 0x0, 0x80000000, 0x0) 17:42:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}], 0x1, 0x0) 17:42:42 executing program 2: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) connect$caif(r0, &(0x7f0000000840), 0x18) 17:42:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}], 0x1, 0x0) 17:42:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x6) 17:42:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, 0x0) 17:42:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}], 0x1, 0x0) 17:42:42 executing program 3: prctl$PR_GET_FPEMU(0x9, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:42 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000040)="2e0000001000052dd25a80648c63940d0300fc00100002400200a06d053582c137153e370933018000f01700d1bd", 0x2e}], 0x1}, 0x0) [ 1167.952378][ T35] audit: type=1804 audit(1612460562.313:820): pid=16219 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1313/bus" dev="sda1" ino=14324 res=1 errno=0 [ 1168.013455][T16224] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 17:42:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}], 0x2, 0x0) 17:42:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}], 0x2, 0x0) 17:42:43 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000040)="2e0000001000052dd25a80648c63940d0300fc00100002400200a06d053582c137153e370933018000f01700d1bd", 0x2e}], 0x1}, 0x0) 17:42:43 executing program 3: prctl$PR_GET_FPEMU(0x9, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:43 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffb) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', 0x0, 0x0, 0x2, &(0x7f0000000480)=[{0x0}, {0x0}], 0x0, &(0x7f0000000500)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) 17:42:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}], 0x2, 0x0) 17:42:43 executing program 2: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000002a40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)=']\x00', 0x0) 17:42:43 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000007400)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000600)='3', 0x1}], 0x1, &(0x7f0000000700)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x200}}], 0x30}], 0x1, 0x0) [ 1168.784460][T16253] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 17:42:43 executing program 3: prctl$PR_GET_FPEMU(0x9, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:43 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) 17:42:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002f40)={0x0, 0x0, &(0x7f0000002f00)={&(0x7f0000002e40)=@ipv6_delrule={0x1c, 0x21, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x11}}, 0x1c}, 0x1, 0x0, 0x0, 0x1052}, 0x0) [ 1168.924079][ T35] audit: type=1804 audit(1612460563.283:821): pid=16271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1314/bus" dev="sda1" ino=14320 res=1 errno=0 [ 1168.968377][T16273] new mount options do not match the existing superblock, will be ignored [ 1169.010391][T16273] new mount options do not match the existing superblock, will be ignored 17:42:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000040)='\a', 0x1}], 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001}], 0x2, 0x0) 17:42:44 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='9p\x00', 0x84080, &(0x7f0000000d00)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@access_uid={'access', 0x3d, r1}}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@cache_mmap='cache=mmap'}, {@fscache='fscache'}, {@fscache='fscache'}], [{@obj_type={'obj_type', 0x3d, 'Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QUw!j\x91\x0eW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1\xb04A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd93\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QUw!j\x91\x0eW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1\xb04A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930x0) io_submit(r3, 0x1b, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0x79000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a31e3fd987a7d49}]) 17:42:44 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000080)) 17:42:44 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000016c0)={0x0, 0x10, &(0x7f0000001680)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000001700)=0x10) 17:42:44 executing program 3: prctl$PR_GET_FPEMU(0x9, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) 17:42:44 executing program 5: r0 = epoll_create1(0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x4758ce2e204a3583}) 17:42:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000700000000001c0012800b00010062726964676500000c00028008001b"], 0x3c}}, 0x0) 17:42:44 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:42:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80084502, 0x0) 17:42:44 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6b151818"}, 0x0, 0x0, @userptr}) [ 1169.938259][ T35] audit: type=1804 audit(1612460564.303:822): pid=16325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1315/bus" dev="sda1" ino=14340 res=1 errno=0 17:42:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:45 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'io'}]}, 0x4) 17:42:45 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000001180)='/dev/input/mouse#\x00', 0x0, 0x82001) write$vhost_msg(r0, 0x0, 0x0) 17:42:45 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}]}, &(0x7f0000000140)=0x10) 17:42:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, 0x0, &(0x7f00000031c0)) 17:42:45 executing program 0: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', 0x0, 0x0, 0x1, &(0x7f0000000480)=[{0x0}], 0x0, &(0x7f0000000500)={[{'/dev/dri/card#\x00'}]}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, 0x0, 0x0) 17:42:45 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) 17:42:45 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/197, 0xc5}], 0x1) 17:42:45 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, 0x0) 17:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="af0d387a84639c0541a584840060d5671ac4b1a9404a0e6edcb01a7b1b93166fe417b3c69421df53b470f8cd92bf4438c76b5c70ded6daa07d5248a255df68f205e6f1e2fe0313f59c4ab7bb7da71e8dbf3b3c1d6c72dba4ebd6278bf006a2dfb9a2426dc9e76626055a7408eb3fceef34d3f259cc12ff1cf32a20dc670ccf5659c585a3e471c4758d555f290a9c590391f4e00879394ff341082c603e578d3225c11b908c4e59c3040209660fbb50111622a009", 0xb4) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) connect(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x2}, 0x80) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2ab) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x4, 0x1, 0x8, 0x0, 0x4, 0x602, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0xfffffffffffffa8f}, 0x100, 0x7fff, 0x2d4, 0x7, 0x1, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x81) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1c500) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000300)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x10000000, 0x10001, 0x0, 0x7, 0x10000000081, 0x2, 0x9, 0x4}, 0x0) socket$unix(0x1, 0x5, 0x0) 17:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="af0d387a84639c0541a584840060d5671ac4b1a9404a0e6edcb01a7b1b93166fe417b3c69421df53b470f8cd92bf4438c76b5c70ded6daa07d5248a255df68f205e6f1e2fe0313f59c4ab7bb7da71e8dbf3b3c1d6c72dba4ebd6278bf006a2dfb9a2426dc9e76626055a7408eb3fceef34d3f259cc12ff1cf32a20dc670ccf5659c585a3e471c4758d555f290a9c590391f4e00879394ff341082c603e578d3225c11b908c4e59c3040209660fbb50111622", 0xb2) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) connect(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x2}, 0x80) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2b5) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x4, 0x1, 0x8, 0x0, 0x4, 0x602, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffa8f}, 0x100, 0x7fff, 0x2d4, 0x0, 0x1, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x81) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1c500) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x10000000, 0x0, 0x6, 0x7, 0x10000000081, 0x2, 0x9, 0x4}, 0x0) socket$unix(0x1, 0x5, 0x0) 17:42:45 executing program 1: ioprio_set$uid(0x3, 0xee01, 0x4004) [ 1170.880043][T16362] loop2: detected capacity change from 264192 to 0 [ 1170.914708][ T35] audit: type=1804 audit(1612460565.273:823): pid=16365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir828916481/syzkaller.fOW68J/1176/file0" dev="sda1" ino=14347 res=1 errno=0 [ 1171.043970][ T35] audit: type=1804 audit(1612460565.303:824): pid=16362 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1258/file1/file0" dev="loop2" ino=51 res=1 errno=0 [ 1171.070971][ T35] audit: type=1804 audit(1612460565.353:825): pid=16373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1316/bus" dev="sda1" ino=14322 res=1 errno=0 [ 1171.289725][ T35] audit: type=1804 audit(1612460565.653:826): pid=16362 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1258/file1/file1/file0" dev="loop2" ino=53 res=1 errno=0 17:42:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:46 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:42:46 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, 0x0, &(0x7f00000000c0)) 17:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="af0d387a84639c0541a584840060d5671ac4b1a9404a0e6edcb01a7b1b93166fe417b3c69421df53b470f8cd92bf4438c76b5c70ded6daa07d5248a255df68f205e6f1e2fe0313f59c4ab7bb7da71e8dbf3b3c1d6c72dba4ebd6278bf006a2dfb9a2426dc9e76626055a7408eb3fceef34d3f259cc12ff1cf32a20dc670ccf5659c585a3e471c4758d555f290a9c590391f4e00879394ff341082c603e578d3225c11b908c4e59c3040209660fbb5011", 0xb0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) connect(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x2}, 0x80) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x4, 0x1, 0x8, 0x0, 0x4, 0x602, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0xfffffffffffffa8f}, 0x100, 0x7fff, 0x2d4, 0x7, 0x1, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x81) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1c500) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x10000000, 0x10001, 0x6, 0x7, 0x10000000081, 0x2, 0x9, 0x4}, 0x0) socket$unix(0x1, 0x5, 0x0) 17:42:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="af0d387a84639c0541a584840060d5671ac4b1a9404a0e6edcb01a7b1b93166fe417b3c69421df53b470f8cd92bf4438c76b5c70ded6daa07d5248a255df68f205e6f1e2fe0313f59c4ab7bb7da71e8dbf3b3c1d6c72dba4ebd6278bf006a2dfb9a2426dc9e76626055a7408eb3fceef34d3f259cc12ff1cf32a20dc670ccf5659c585a3e471c4758d555f290a9c590391f4e00879394ff341082c603e578d3225c11b908c4e59c3040209660fbb50111622", 0xb2) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) connect(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x2}, 0x80) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2b5) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x4, 0x1, 0x8, 0x0, 0x4, 0x602, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffa8f}, 0x100, 0x7fff, 0x2d4, 0x0, 0x1, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x81) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1c500) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x10000000, 0x0, 0x6, 0x7, 0x10000000081, 0x2, 0x9, 0x4}, 0x0) socket$unix(0x1, 0x5, 0x0) 17:42:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="af0d387a84639c0541a584840060d5671ac4b1a9404a0e6edcb01a7b1b93166fe417b3c69421df53b470f8cd92bf4438c76b5c70ded6daa07d5248a255df68f205e6f1e2fe0313f59c4ab7bb7da71e8dbf3b3c1d6c72dba4ebd6278bf006a2dfb9a2426dc9e76626055a7408eb3fceef34d3f259cc12ff1cf32a20dc670ccf5659c585a3e471c4758d555f290a9c590391f4e00879394ff341082c603e578d3225c11b908c4e59c3040209660fbb50111622a009", 0xb4) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) connect(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x2}, 0x80) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2ab) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x4, 0x1, 0x8, 0x0, 0x4, 0x602, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0xfffffffffffffa8f}, 0x100, 0x7fff, 0x2d4, 0x7, 0x1, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x81) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1c500) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000300)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x10000000, 0x10001, 0x0, 0x7, 0x10000000081, 0x2, 0x9, 0x4}, 0x0) socket$unix(0x1, 0x5, 0x0) [ 1171.718514][ T35] audit: type=1804 audit(1612460566.083:827): pid=16389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir828916481/syzkaller.fOW68J/1176/file1/file0" dev="sda1" ino=14326 res=1 errno=0 [ 1171.810650][T16393] loop2: detected capacity change from 264192 to 0 [ 1171.831470][ T35] audit: type=1804 audit(1612460566.193:828): pid=16401 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir828916481/syzkaller.fOW68J/1177/file0" dev="sda1" ino=14339 res=1 errno=0 [ 1171.888957][T16399] loop1: detected capacity change from 264192 to 0 17:42:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) 17:42:46 executing program 5: prctl$PR_GET_FPEMU(0x9, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="600000004a00010029bd7000ffdbdf250a008000", @ANYBLOB='\t'], 0x60}}, 0x0) 17:42:46 executing program 1: mq_open(&(0x7f0000000040)='#}\x00', 0x0, 0x0, &(0x7f0000000080)) [ 1172.412579][ T35] audit: type=1804 audit(1612460566.243:829): pid=16393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1259/file1/file0" dev="loop2" ino=55 res=1 errno=0 [ 1172.499738][ T35] audit: type=1804 audit(1612460566.313:830): pid=16399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir968551550/syzkaller.J9MhpQ/1110/file1/file0" dev="loop1" ino=57 res=1 errno=0 [ 1172.507309][T16425] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. 17:42:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="af0d387a84639c0541a584840060d5671ac4b1a9404a0e6edcb01a7b1b93166fe417b3c69421df53b470f8cd92bf4438c76b5c70ded6daa07d5248a255df68f205e6f1e2fe0313f59c4ab7bb7da71e8dbf3b3c1d6c72dba4ebd6278bf006a2dfb9a2426dc9e76626055a7408eb3fceef34d3f259cc12ff1cf32a20dc670ccf5659c585a3e471c4758d555f290a9c590391f4e00879394ff341082c603e578d3225c11b908c4e59c3040209660fbb50111622", 0xb2) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) connect(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x2}, 0x80) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x4, 0x1, 0x8, 0x0, 0x4, 0x602, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffa8f}, 0x100, 0x7fff, 0x2d4, 0x0, 0x1, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x81) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1c500) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x10000000, 0x0, 0x6, 0x7, 0x10000000081, 0x2, 0x9, 0x4}, 0x0) socket$unix(0x1, 0x5, 0x0) [ 1172.526020][ T35] audit: type=1804 audit(1612460566.723:831): pid=16420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1317/bus" dev="sda1" ino=14354 res=1 errno=0 17:42:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x7b) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev}, r1}}, 0x30) [ 1172.726846][T16434] loop2: detected capacity change from 264192 to 0 17:42:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="af0d387a84639c0541a584840060d5671ac4b1a9404a0e6edcb01a7b1b93166fe417b3c69421df53b470f8cd92bf4438c76b5c70ded6daa07d5248a255df68f205e6f1e2fe0313f59c4ab7bb7da71e8dbf3b3c1d6c72dba4ebd6278bf006a2dfb9a2426dc9e76626055a7408eb3fceef34d3f259cc12ff1cf32a20dc670ccf5659c585a3e471c4758d555f290a9c590391f4e00879394ff341082c603e578d3225c11b908c4e59c3040209660fbb50111622a009", 0xb4) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) connect(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x2}, 0x80) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2ab) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x4, 0x1, 0x8, 0x0, 0x4, 0x602, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0xfffffffffffffa8f}, 0x100, 0x7fff, 0x2d4, 0x7, 0x1, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x81) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1c500) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000300)) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x10000000, 0x10001, 0x0, 0x7, 0x10000000081, 0x2, 0x9, 0x4}, 0x0) socket$unix(0x1, 0x5, 0x0) 17:42:47 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) connect(r0, &(0x7f00000032c0)=@ethernet={0x0, @multicast}, 0x80) 17:42:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0xf402}}, 0x18) 17:42:47 executing program 5: prctl$PR_GET_FPEMU(0x9, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="af0d387a84639c0541a584840060d5671ac4b1a9404a0e6edcb01a7b1b93166fe417b3c69421df53b470f8cd92bf4438c76b5c70ded6daa07d5248a255df68f205e6f1e2fe0313f59c4ab7bb7da71e8dbf3b3c1d6c72dba4ebd6278bf006a2dfb9a2426dc9e76626055a7408eb3fceef34d3f259cc12ff1cf32a20dc670ccf5659c585a3e471c4758d555f290a9c590391f4e00879394ff341082c603e578d3225c11b908c4e59c3040209660fbb50111622", 0xb2) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) connect(r0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x8, @empty, 0x2}, 0x80) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2b5) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x4, 0x1, 0x8, 0x0, 0x4, 0x602, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffa8f}, 0x100, 0x7fff, 0x2d4, 0x0, 0x1, 0x8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x81) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1c500) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x10000000, 0x0, 0x6, 0x7, 0x10000000081, 0x2, 0x9, 0x4}, 0x0) socket$unix(0x1, 0x5, 0x0) 17:42:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x8080ffffff7e) [ 1173.150822][T16449] loop2: detected capacity change from 264192 to 0 17:42:47 executing program 5: prctl$PR_GET_FPEMU(0x9, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:47 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) 17:42:47 executing program 3: msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) 17:42:47 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) 17:42:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, 0x0) 17:42:48 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000040)=""/202, 0xca, 0x143, 0x0, 0x0) 17:42:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$CHAR_RAW_RAGET(r0, 0x1263, 0x0) 17:42:48 executing program 5: prctl$PR_GET_FPEMU(0x9, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfe8d) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000380)={0x10017, 0x0, 0x0, 0x0, 0x0, "0001227b7c00faff050000fff7fffffffffdf0"}) 17:42:48 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 17:42:48 executing program 2: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCNOTTY(r0, 0x5422) 17:42:48 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERROR(r0, 0x0, 0x0) 17:42:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x8080ffffff7e) 17:42:48 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 17:42:48 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_ATTR(r0, 0x0, 0x0) 17:42:48 executing program 2: clock_gettime(0x5, &(0x7f0000000080)) 17:42:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$CHAR_RAW_RAGET(r0, 0x1263, 0x0) 17:42:48 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0xffffff5f) write$P9_RLOCK(r0, &(0x7f0000000000)={0x8}, 0x8) 17:42:48 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 17:42:48 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RCREATE(r0, 0x0, 0x0) 17:42:48 executing program 2: pipe2$9p(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r0, 0x0, 0x0) 17:42:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$CHAR_RAW_RAGET(r0, 0x1263, 0x0) 17:42:48 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0xffffff5f) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x10}, 0x10) 17:42:48 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 17:42:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x8080ffffff7e) 17:42:49 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$CHAR_RAW_RAGET(r0, 0x1263, 0x0) 17:42:49 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x101040, 0x0) 17:42:49 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r0, &(0x7f0000002080)=ANY=[], 0x68) 17:42:49 executing program 5: mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000001) 17:42:49 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 17:42:49 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CHAR_RAW_ROTATIONAL(r0, 0x127e, 0x0) 17:42:49 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) read$char_usb(r0, 0x0, 0x0) 17:42:49 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x801002, 0x0) 17:42:49 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) 17:42:49 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, 0x0, 0x0) 17:42:49 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000002140)='/dev/urandom\x00', 0x105002, 0x0) [ 1175.551039][ T35] kauditd_printk_skb: 5 callbacks suppressed [ 1175.551051][ T35] audit: type=1804 audit(1612460569.913:837): pid=16571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1320/bus" dev="sda1" ino=14321 res=1 errno=0 17:42:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000080)) 17:42:50 executing program 1: sysinfo(&(0x7f0000000200)=""/4096) 17:42:50 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x80000, 0x0) 17:42:50 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) 17:42:50 executing program 5: getgroups(0x0, &(0x7f0000000200)) 17:42:50 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$CHAR_RAW_PG(r0, 0x1269, 0x0) 17:42:50 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) read$char_usb(r0, &(0x7f0000000100)=""/25, 0x19) 17:42:50 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0xa8c0, 0x0) 17:42:50 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CHAR_RAW_IOOPT(r0, 0x1279, 0x0) 17:42:50 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000080), 0x4) 17:42:50 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$CHAR_RAW_ROSET(r0, 0x125d, 0x0) [ 1176.582240][ T35] audit: type=1804 audit(1612460570.944:838): pid=16610 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1321/bus" dev="sda1" ino=14321 res=1 errno=0 17:42:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:51 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, 0x0) 17:42:51 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0xffffff5f) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18}, 0x18) 17:42:51 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RCREATE(r0, 0x0, 0x21) 17:42:51 executing program 2: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r0, &(0x7f0000000040), 0xfffffffffffffe09) 17:42:51 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_IOCTL(r0, 0x0, 0x0) 17:42:51 executing program 2: timer_create(0x4, &(0x7f00000000c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000100)) 17:42:51 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$tcp_mem(r0, 0x0, 0x0) 17:42:51 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000008, 0x72beeb7fdc6631fe, r0, 0x0) 17:42:51 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 17:42:51 executing program 0: socket(0x1, 0x0, 0x10001) 17:42:51 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x0, &(0x7f0000000000)) [ 1177.592920][ T35] audit: type=1804 audit(1612460571.954:839): pid=16649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1322/bus" dev="sda1" ino=14321 res=1 errno=0 17:42:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:52 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, &(0x7f0000000080)) 17:42:52 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) 17:42:52 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0xffffff5f) write$P9_RSTATFS(r0, &(0x7f0000000000)={0x43}, 0x43) 17:42:52 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 17:42:52 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSTATu(r0, 0x0, 0x0) 17:42:52 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) accept4(r1, 0x0, 0x0, 0x0) 17:42:52 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) 17:42:52 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 17:42:52 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 17:42:52 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSTAT(r0, 0x0, 0x0) 17:42:52 executing program 5: io_setup(0x0, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000100)=[{}], 0x0) [ 1178.590463][ T35] audit: type=1804 audit(1612460572.954:840): pid=16687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1323/bus" dev="sda1" ino=14334 res=1 errno=0 17:42:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:53 executing program 2: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$char_usb(r0, 0x0, 0x0) 17:42:53 executing program 1: mprotect(&(0x7f0000b19000/0x1000)=nil, 0x1000, 0x2000000) 17:42:53 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 17:42:53 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERRORu(r0, &(0x7f00000004c0)=ANY=[], 0x1b) 17:42:53 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CHAR_RAW_IOMIN(r0, 0x1278, 0x0) 17:42:53 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) 17:42:53 executing program 1: socketpair(0x0, 0x80405, 0x0, 0x0) 17:42:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 17:42:53 executing program 0: munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 17:42:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000003800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000037c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000003840)={0x13, 0x10, 0xfa00, {&(0x7f00000035c0), r1}}, 0x18) 17:42:53 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0xffffff5f) write$P9_RVERSION(r0, &(0x7f0000000140)=ANY=[], 0x15) [ 1179.616021][ T35] audit: type=1804 audit(1612460573.974:841): pid=16730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1324/bus" dev="sda1" ino=14321 res=1 errno=0 17:42:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:54 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80800, 0x0) 17:42:54 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0xffffff5f) write$P9_RSTAT(r0, &(0x7f0000000000)={0x40, 0x7d, 0x0, {0x0, 0x39, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '\\', 0x0, '', 0x5, '(\'\\:\x00'}}, 0x40) 17:42:54 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10}, 0x10) 17:42:54 executing program 2: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) read$char_raw(r0, 0x0, 0xfffffffffffffde6) 17:42:54 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(r0, 0x0, 0x0) 17:42:54 executing program 2: pipe(&(0x7f0000000480)={0xffffffffffffffff}) accept(r0, 0x0, 0x0) 17:42:54 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RVERSION(r0, 0x0, 0x0) 17:42:54 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) read$char_raw(r0, &(0x7f0000000200)={""/30983}, 0x7a00) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14}, 0xffffff5f) 17:42:54 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 17:42:54 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r0, 0x0, 0x68) 17:42:54 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0xffffff5f) write$FUSE_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 1180.590067][ T35] audit: type=1804 audit(1612460574.954:842): pid=16772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1325/bus" dev="sda1" ino=14344 res=1 errno=0 17:42:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:42:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @empty}}}], 0x40, 0x5}, 0xbb8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x2, &(0x7f0000000280)=@raw=[@alu={0x4, 0x1, 0x1, 0x0, 0xa, 0x0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], 0x0, 0x4, 0x16, &(0x7f0000000580)=""/22, 0x0, 0x2, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x7ff, 0x1ff}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x48) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, 0x0, 0x0) 17:42:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x1}, @jmp={0x5, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe}, @jmp={0x4, 0x0, 0x6}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 17:42:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)="230000005e0081eee4050c00000f0000008b000000", 0x15}, {&(0x7f0000000240)="77889bc26c53bbfa56fd12cda00b", 0xe}], 0x2}, 0x0) 17:42:55 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3]}, 0x47}, 0x80, 0x0}, 0x0) 17:42:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=""/20, 0x14, 0x7301}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000002c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x0, 0xff, 0xfa, "82f52b4e9ca73b17eb77119439b1d0d60f0ab67c742da38772ba8a5cd4c3873b2a51ffc7bc9d16e31b135579227d7c9100cc399340feb628f35e0b5f587d82"}, 0x80, &(0x7f0000001380)=[{0xfffffffffffffffd}, {&(0x7f0000001640)="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", 0xafd}, {0x0}], 0x3}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000240)=@in6={0xa, 0x4f24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 17:42:55 executing program 5: socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 17:42:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002980)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000eaff95"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r0}, 0xc) 17:42:55 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}, 0xc) 17:42:55 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)="230000005e0081eee4050c00000f0000008b000000", 0x15}, {&(0x7f0000000240)="77889bc26c53bbfa56fd12cda00b", 0xe}], 0x2}, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) 17:42:55 executing program 1: socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x1}, @jmp={0x5, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe}, @jmp={0x4, 0x0, 0x6}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socket$kcm(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e00)}, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 17:42:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000240)=@in6={0xa, 0x4f24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1181.659223][ T35] audit: type=1804 audit(1612460576.024:843): pid=16824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1326/bus" dev="sda1" ino=14321 res=1 errno=0 17:42:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:42:56 executing program 2: syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x3, 0x0) 17:42:56 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:42:56 executing program 1: syz_open_dev$evdev(&(0x7f0000001240)='/dev/input/event#\x00', 0x0, 0x0) 17:42:56 executing program 3: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x6800) 17:42:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000240)=@in6={0xa, 0x4f24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 17:42:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000240)=@in6={0xa, 0x4f24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 17:42:56 executing program 1: syz_open_dev$evdev(&(0x7f00000025c0)='/dev/input/event#\x00', 0x0, 0x0) 17:42:56 executing program 3: syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x40c1) 17:42:56 executing program 3: timer_create(0x0, &(0x7f0000002040), 0x0) 17:42:57 executing program 3: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080)='NLBL_CIPSOv4\x00') 17:42:57 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000044c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0xc) [ 1182.629301][ T35] audit: type=1804 audit(1612460576.994:844): pid=16862 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1327/bus" dev="sda1" ino=14344 res=1 errno=0 [ 1182.746583][T10422] usb 6-1: new high-speed USB device number 80 using dummy_hcd [ 1183.016270][T10422] usb 6-1: Using ep0 maxpacket: 8 [ 1183.146262][T10422] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1183.155639][T10422] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1183.168759][T10422] usb 6-1: config 0 descriptor?? [ 1183.231314][T10422] gspca_main: stk1135-2.14.0 probing 174f:6a31 17:42:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:42:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) [ 1183.580830][ T35] audit: type=1804 audit(1612460577.944:845): pid=16888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1328/bus" dev="sda1" ino=14324 res=1 errno=0 [ 1184.757400][T10422] gspca_stk1135: reg_w 0xf err -71 [ 1184.763814][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1184.777734][T10422] gspca_stk1135: Sensor write failed [ 1184.783032][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1184.789363][T10422] gspca_stk1135: Sensor write failed [ 1184.794957][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1184.804127][T10422] gspca_stk1135: Sensor read failed [ 1184.810137][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1184.817543][T10422] gspca_stk1135: Sensor read failed [ 1184.822742][T10422] gspca_stk1135: Detected sensor type unknown (0x0) [ 1184.829492][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1184.838862][T10422] gspca_stk1135: Sensor read failed [ 1184.844584][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1184.851137][T10422] gspca_stk1135: Sensor read failed [ 1184.856423][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1184.862736][T10422] gspca_stk1135: Sensor write failed [ 1184.868072][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1184.876356][T10422] gspca_stk1135: Sensor write failed [ 1184.881737][T10422] stk1135: probe of 6-1:0.0 failed with error -71 [ 1184.890567][T10422] usb 6-1: USB disconnect, device number 80 [ 1185.526041][ T9003] usb 6-1: new high-speed USB device number 81 using dummy_hcd [ 1185.816017][ T9003] usb 6-1: Using ep0 maxpacket: 8 [ 1185.956056][ T9003] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1185.965140][ T9003] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1185.981387][ T9003] usb 6-1: config 0 descriptor?? [ 1186.048473][ T9003] gspca_main: stk1135-2.14.0 probing 174f:6a31 17:43:00 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000025c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000000)=""/94) 17:43:00 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000025c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) 17:43:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000240)=@in6={0xa, 0x4f24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0d8ca56b50f0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8000000000000000b91c61ccd106cb937b450f859ce8122a79c3e40000b59b0fc46d6cec3c080a882add4e1179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e110000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 17:43:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 17:43:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) [ 1186.175956][ T9003] gspca_stk1135: reg_w 0x2 err -71 [ 1186.182139][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1186.214742][ T9003] gspca_stk1135: Sensor write failed 17:43:00 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) [ 1186.228713][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1186.235093][ T9003] gspca_stk1135: Sensor write failed [ 1186.248096][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1186.260016][ T9003] gspca_stk1135: Sensor read failed [ 1186.265310][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1186.278754][ T35] audit: type=1804 audit(1612460580.644:846): pid=16920 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1329/bus" dev="sda1" ino=14322 res=1 errno=0 [ 1186.285244][ T9003] gspca_stk1135: Sensor read failed 17:43:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x4, 0x0, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x6, 0x0, 0x0, 0xff, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='/\\/${\x00') bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) [ 1186.353921][ T9003] gspca_stk1135: Detected sensor type unknown (0x0) [ 1186.364747][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1186.376114][ T9003] gspca_stk1135: Sensor read failed [ 1186.381737][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1186.404598][ T9003] gspca_stk1135: Sensor read failed [ 1186.414693][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1186.426663][ T9003] gspca_stk1135: Sensor write failed [ 1186.432328][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1186.447663][ T9003] gspca_stk1135: Sensor write failed [ 1186.454484][ T9003] stk1135: probe of 6-1:0.0 failed with error -71 [ 1186.465762][ T9003] usb 6-1: USB disconnect, device number 81 17:43:00 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x20}}, 0x0) 17:43:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x4, 0x0, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x6, 0x0, 0x0, 0xff, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='/\\/${\x00') bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) 17:43:00 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1186.845908][ T1961] usb 4-1: new high-speed USB device number 85 using dummy_hcd [ 1186.853730][ T9003] usb 6-1: new high-speed USB device number 82 using dummy_hcd [ 1187.125908][ T9003] usb 6-1: Using ep0 maxpacket: 8 [ 1187.130981][ T1961] usb 4-1: Using ep0 maxpacket: 8 [ 1187.275933][ T1961] usb 4-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1187.285013][ T1961] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1187.299944][ T9003] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1187.309000][ T9003] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1187.324790][ T1961] usb 4-1: config 0 descriptor?? [ 1187.336290][ T9003] usb 6-1: config 0 descriptor?? [ 1187.388186][ T9003] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1187.396528][ T1961] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1188.876120][ T9003] gspca_stk1135: reg_w 0xf err -71 [ 1188.881416][ T1961] gspca_stk1135: reg_w 0xf err -71 [ 1188.887560][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1188.893884][ T1961] gspca_stk1135: Sensor write failed [ 1188.906973][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1188.915574][ T9003] gspca_stk1135: Sensor write failed [ 1188.922487][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1188.928980][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1188.935437][ T9003] gspca_stk1135: Sensor write failed [ 1188.940777][ T1961] gspca_stk1135: Sensor write failed [ 1188.947120][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1188.953540][ T1961] gspca_stk1135: Sensor read failed [ 1188.958832][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1188.965459][ T9003] gspca_stk1135: Sensor read failed [ 1188.971459][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1188.977895][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1188.984402][ T9003] gspca_stk1135: Sensor read failed [ 1188.989629][ T1961] gspca_stk1135: Sensor read failed [ 1188.995497][ T1961] gspca_stk1135: Detected sensor type unknown (0x0) [ 1189.002991][ T9003] gspca_stk1135: Detected sensor type unknown (0x0) [ 1189.009670][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1189.016132][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1189.023202][ T1961] gspca_stk1135: Sensor read failed [ 1189.028982][ T9003] gspca_stk1135: Sensor read failed [ 1189.034185][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1189.040650][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1189.047033][ T9003] gspca_stk1135: Sensor read failed [ 1189.053089][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1189.059444][ T1961] gspca_stk1135: Sensor read failed [ 1189.064636][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1189.071092][ T9003] gspca_stk1135: Sensor write failed [ 1189.076861][ T1961] gspca_stk1135: Sensor write failed [ 1189.082260][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1189.090228][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1189.096568][ T9003] gspca_stk1135: Sensor write failed [ 1189.101858][ T9003] stk1135: probe of 6-1:0.0 failed with error -71 [ 1189.108403][ T1961] gspca_stk1135: Sensor write failed [ 1189.114228][ T1961] stk1135: probe of 4-1:0.0 failed with error -71 [ 1189.122587][ T9003] usb 6-1: USB disconnect, device number 82 [ 1189.131360][ T1961] usb 4-1: USB disconnect, device number 85 17:43:03 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:03 executing program 1: syz_read_part_table(0xfffffffffffffff7, 0x0, 0x0) 17:43:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x4, 0x0, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x6, 0x0, 0x0, 0xff, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='/\\/${\x00') bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) 17:43:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:43:03 executing program 3: init_module(&(0x7f0000000600)='/dev/vcsa\x00\x14\xc7\f\xe6\x92\x0ft\x85s\xd6\xfb\x93Z\x90F\x99\xd0\xa2\xfa\vk~]\xe128\x82(\xc1\x86\xb2O\xb6\x88ICO\x8dUaqXe\xb1J\x84\xe2\xafQ88S\xfca\x8c\xe7\x97\xc4+\xc4\xc3\x19vPA\xbd\xa1\xb4!\x1f\x00Jt2\a\xe1\xce\x96\x17\xf2\t\x94kD\x06\xd4\x94C\x86\xc4\x13\x11\x10\xe55\xbaV\'s\x93\xba\x9d\xa5T:;\xc2\xb7\xe1\xa6\x17Mf/\x13`\xe2\x03\xf8\xb3\xbf\x0f\x0e[C+\x15\xeb\x0e\xf2\xeev\xf2\xb6\v\xb2\x9c{K\x0f\x00\xae\x03\x00\x00\x00\x00\x00\x00\x00\xef\xcc\xc2\x16S^\xf0(\x983e\xdf\xceJQ\f\x0fv\xa6\x83\xb2\xc2G\xbd\x15,\x9cZ\xc6T+\xeb\xb2\xdd?\xa2Gr\a\xc9?\x1a\xe7\x1b\xc3\x19 \xe5c\x0e1\xb5\x82\xee0mq\x90e\xca\x9e`\x8a\xea\xcc\xec\xfd\xa3co\x90u\x11RV\x00\x00R\xa5[$j\xd2`\xe7\x9a\x00\x00\x00\x00\xd1\xac(]C|n\xa6\a\x85e\x81\x96\xe0N\x98\x06\xc6z\x86)\xcf\x1an\x9e\xfa\x95J\xdf`\x98\x88\f\xc7}St\xa2\x9d\x88\xa9v\x88\xbcoUM\xee\x9b\xee\x19\xe8\xcc\xcc`\a\xdc\xb6V\xfb\xbd\xe4_&*\xf6\xf5\xedVL\xfc\xbb\xeb@\xc9V?\xca\xefvM\x10\xd0\a\fJ\xaaW\x9f\x94\x83\xd2\xecc\xfb\x8f|\xcew\xa9\xbf\xac\x00K)\xc6?{\xa8\xe4x\xe8\x00\x00\x00\x00\x00\x00\x01\x00$ \x7f=', 0x176, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 17:43:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1189.441014][T16983] loop1: detected capacity change from 264192 to 0 [ 1189.450563][T16988] Module has invalid ELF header [ 1189.456953][T16988] Module has invalid ELF header 17:43:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x4, 0x0, 0x6, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x6, 0x0, 0x0, 0xff, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='/\\/${\x00') bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x40) 17:43:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x541b, &(0x7f0000000000)) 17:43:03 executing program 2: sendto(0xffffffffffffffff, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1189.551503][T16983] loop1: detected capacity change from 264192 to 0 [ 1189.570403][ T35] audit: type=1804 audit(1612460583.935:847): pid=17001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1330/bus" dev="sda1" ino=14324 res=1 errno=0 17:43:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001300)='net/igmp\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) dup3(r2, r1, 0x0) sendfile(r2, r0, 0x0, 0x6f0a77bd) 17:43:04 executing program 2: sendto(0xffffffffffffffff, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f4ed41142483e4ff61baffffac9429dd9aa7cdc78064d86ddcefb019c27ab4e2936bbf9e0efcc6719", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1189.745693][T12010] usb 6-1: new high-speed USB device number 83 using dummy_hcd [ 1189.996106][T12010] usb 6-1: Using ep0 maxpacket: 8 [ 1190.115736][T12010] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1190.125969][T12010] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1190.153941][T12010] usb 6-1: config 0 descriptor?? [ 1190.207771][T12010] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1191.746732][T12010] gspca_stk1135: reg_w 0xf err -71 [ 1191.752947][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1191.766138][T12010] gspca_stk1135: Sensor write failed [ 1191.771524][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1191.783925][T12010] gspca_stk1135: Sensor write failed [ 1191.792383][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1191.801908][T12010] gspca_stk1135: Sensor read failed [ 1191.810437][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1191.819985][T12010] gspca_stk1135: Sensor read failed [ 1191.825166][T12010] gspca_stk1135: Detected sensor type unknown (0x0) [ 1191.838659][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1191.844977][T12010] gspca_stk1135: Sensor read failed [ 1191.856587][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1191.863025][T12010] gspca_stk1135: Sensor read failed [ 1191.868489][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1191.876135][T12010] gspca_stk1135: Sensor write failed [ 1191.881604][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1191.888012][T12010] gspca_stk1135: Sensor write failed [ 1191.893301][T12010] stk1135: probe of 6-1:0.0 failed with error -71 [ 1191.900891][T12010] usb 6-1: USB disconnect, device number 83 17:43:06 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:06 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fcntl$lock(r0, 0x8, 0x0) 17:43:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 17:43:06 executing program 2: sendto(0xffffffffffffffff, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x81, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setpipe(r0, 0x407, 0x0) 17:43:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:43:06 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semop(r0, &(0x7f00000005c0)=[{0x1, 0x5}, {0x1, 0x0, 0x1000}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) 17:43:06 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:06 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x9, 0x0, 0x0, 0x0, 0x369c, 0x3, 0x8, 0x2a23, 0x200, 0x0, 0x80000000, 0x3b8, 0xfffffffffffffff9, 0x1}}) bind$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @remote}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0xd, 0x0, 0x1, 0x21, 0x6, @broadcast}, 0x14) io_setup(0xffff, &(0x7f0000001280)=0x0) io_submit(r2, 0x1, &(0x7f0000001e80)=[&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) socket$packet(0x11, 0x0, 0x300) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000065fc0)={0x9, [{r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {}, {}, {}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {}, {}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {}, {}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {r1}], 0x7f, "a0e7293cca518e"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000066fc0)={{0x0, 0x0, 0x3f, 0x101, 0x8, 0x0, 0xb72, 0x20, 0x0, 0x1f, 0x3, 0x3, 0x0, 0x7, 0x2}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000067fc0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 17:43:06 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f4ed41142483e4ff61baffffac9429dd9aa7cdc78064d86ddcefb019c27ab4e2936bbf9e0efcc6719", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:06 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) [ 1192.431872][ T35] audit: type=1804 audit(1612460586.795:848): pid=17065 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1331/bus" dev="sda1" ino=14344 res=1 errno=0 [ 1192.535370][T12010] usb 6-1: new high-speed USB device number 84 using dummy_hcd [ 1192.775355][T12010] usb 6-1: Using ep0 maxpacket: 8 [ 1192.895756][T12010] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1192.905279][T12010] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1192.916579][T12010] usb 6-1: config 0 descriptor?? [ 1192.960179][T12010] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1194.485603][T12010] gspca_stk1135: reg_w 0xf err -71 [ 1194.491822][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1194.500088][T12010] gspca_stk1135: Sensor write failed [ 1194.508162][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1194.515746][T12010] gspca_stk1135: Sensor write failed [ 1194.521080][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1194.527599][T12010] gspca_stk1135: Sensor read failed [ 1194.534219][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1194.542085][T12010] gspca_stk1135: Sensor read failed [ 1194.547385][T12010] gspca_stk1135: Detected sensor type unknown (0x0) [ 1194.554130][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1194.560850][T12010] gspca_stk1135: Sensor read failed [ 1194.566176][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1194.572527][T12010] gspca_stk1135: Sensor read failed [ 1194.578853][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1194.586457][T12010] gspca_stk1135: Sensor write failed [ 1194.592184][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1194.599876][T12010] gspca_stk1135: Sensor write failed [ 1194.605263][T12010] stk1135: probe of 6-1:0.0 failed with error -71 [ 1194.612774][T12010] usb 6-1: USB disconnect, device number 84 17:43:09 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) 17:43:09 executing program 2: socket$packet(0x11, 0x2, 0x300) sendto(0xffffffffffffffff, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) 17:43:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x9, 0x0, 0x0, 0x0, 0x369c, 0x3, 0x8, 0x2a23, 0x200, 0x0, 0x80000000, 0x3b8, 0xfffffffffffffff9, 0x1}}) bind$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @remote}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0xd, 0x0, 0x1, 0x21, 0x6, @broadcast}, 0x14) io_setup(0xffff, &(0x7f0000001280)=0x0) io_submit(r2, 0x1, &(0x7f0000001e80)=[&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) socket$packet(0x11, 0x0, 0x300) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000065fc0)={0x9, [{r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {}, {}, {}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {}, {}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {}, {}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {r1}], 0x7f, "a0e7293cca518e"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000066fc0)={{0x0, 0x0, 0x3f, 0x101, 0x8, 0x0, 0xb72, 0x20, 0x0, 0x1f, 0x3, 0x3, 0x0, 0x7, 0x2}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000067fc0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 17:43:09 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) syz_open_procfs(0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x4}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:43:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x4}}, 0x50) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$incfs(r2, &(0x7f0000007a40)='.log\x00', 0x0, 0x0) 17:43:09 executing program 2: socket$packet(0x11, 0x2, 0x300) sendto(0xffffffffffffffff, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x9, 0x0, 0x0, 0x0, 0x369c, 0x3, 0x8, 0x2a23, 0x200, 0x0, 0x80000000, 0x3b8, 0xfffffffffffffff9, 0x1}}) bind$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @remote}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0xd, 0x0, 0x1, 0x21, 0x6, @broadcast}, 0x14) io_setup(0xffff, &(0x7f0000001280)=0x0) io_submit(r2, 0x1, &(0x7f0000001e80)=[&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) socket$packet(0x11, 0x0, 0x300) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000065fc0)={0x9, [{r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {}, {}, {}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {}, {}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {}, {}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {r1}], 0x7f, "a0e7293cca518e"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000066fc0)={{0x0, 0x0, 0x3f, 0x101, 0x8, 0x0, 0xb72, 0x20, 0x0, 0x1f, 0x3, 0x3, 0x0, 0x7, 0x2}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000067fc0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 17:43:09 executing program 2: socket$packet(0x11, 0x2, 0x300) sendto(0xffffffffffffffff, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1195.122655][ T35] audit: type=1804 audit(1612460589.485:849): pid=17116 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1332/bus" dev="sda1" ino=14347 res=1 errno=0 17:43:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x9, 0x0, 0x0, 0x0, 0x369c, 0x3, 0x8, 0x2a23, 0x200, 0x0, 0x80000000, 0x3b8, 0xfffffffffffffff9, 0x1}}) bind$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x11, 0x0, 0x1, 0x5, 0x6, @remote}, 0x14) bind$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0xd, 0x0, 0x1, 0x21, 0x6, @broadcast}, 0x14) io_setup(0xffff, &(0x7f0000001280)=0x0) io_submit(r2, 0x1, &(0x7f0000001e80)=[&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) socket$packet(0x11, 0x0, 0x300) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000065fc0)={0x9, [{r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {}, {}, {}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {}, {}, {r1}, {r1}, {r1}, {}, {r1}, {}, {r1}, {}, {}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {r1}, {}, {r1}, {}, {}, {r1}, {}, {}, {r1}, {r1}, {r1}, {r1}, {}, {}, {r1}, {}, {r1}, {}, {r1}], 0x7f, "a0e7293cca518e"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000066fc0)={{0x0, 0x0, 0x3f, 0x101, 0x8, 0x0, 0xb72, 0x20, 0x0, 0x1f, 0x3, 0x3, 0x0, 0x7, 0x2}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000067fc0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 17:43:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, 0x0, 0x0, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1195.315527][ T1961] usb 6-1: new high-speed USB device number 85 using dummy_hcd [ 1195.575136][ T1961] usb 6-1: Using ep0 maxpacket: 8 [ 1195.715157][ T1961] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1195.724259][ T1961] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1195.741592][ T1961] usb 6-1: config 0 descriptor?? [ 1195.797208][ T1961] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1197.105866][ T1961] gspca_stk1135: reg_w 0xd err -71 [ 1197.112070][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1197.124853][ T1961] gspca_stk1135: Sensor write failed [ 1197.133821][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1197.143711][ T1961] gspca_stk1135: Sensor write failed [ 1197.152479][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1197.162002][ T1961] gspca_stk1135: Sensor read failed [ 1197.170703][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1197.180106][ T1961] gspca_stk1135: Sensor read failed [ 1197.188231][ T1961] gspca_stk1135: Detected sensor type unknown (0x0) [ 1197.194835][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1197.208092][ T1961] gspca_stk1135: Sensor read failed [ 1197.213394][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1197.226057][ T1961] gspca_stk1135: Sensor read failed [ 1197.231334][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1197.237805][ T1961] gspca_stk1135: Sensor write failed [ 1197.243809][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1197.251756][ T1961] gspca_stk1135: Sensor write failed [ 1197.257195][ T1961] stk1135: probe of 6-1:0.0 failed with error -71 [ 1197.264457][ T1961] usb 6-1: USB disconnect, device number 85 17:43:11 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) 17:43:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, 0x0, 0x0, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:11 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 17:43:11 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) syz_open_procfs(0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x4}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r3, 0x4, 0x46000) lseek(r3, 0x4200, 0x1) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) sendfile(r2, r2, &(0x7f0000000100), 0x8080ffffff7e) 17:43:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xb, 0x40}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000300)={0x38, 0x0, 0x10000036, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10001}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}, 0x4}], 0x546, 0x107, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x6d, 0x7, 0x8a, 0x40, 0x0, 0x7, 0x40004, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000000c0), 0x3}, 0x10000, 0x7ff, 0x8, 0x4, 0x1, 0x3, 0x4}, 0x0, 0x8, r2, 0x8) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x40000100012, r1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x7500) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x33, &(0x7f0000000000)=0xffffffff, 0x4) 17:43:12 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, 0x0, 0x0, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:12 executing program 0: timerfd_create(0x0, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f00000004c0)={0x9}, &(0x7f0000000540), 0x0) 17:43:12 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180), 0x0, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1197.694761][ T35] audit: type=1804 audit(1612460592.055:850): pid=17179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1333/bus" dev="sda1" ino=14336 res=1 errno=0 17:43:12 executing program 3: pselect6(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540), &(0x7f00000005c0)={&(0x7f0000000580)={[0x3]}, 0x8}) 17:43:12 executing program 0: r0 = socket(0x28, 0x1, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000640)={&(0x7f0000000080), 0xc, &(0x7f0000000600)={0x0}}, 0x0) 17:43:12 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180), 0x0, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1197.924992][ T7327] usb 6-1: new high-speed USB device number 86 using dummy_hcd [ 1198.174867][ T7327] usb 6-1: Using ep0 maxpacket: 8 [ 1198.295116][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1198.304447][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1198.315694][ T7327] usb 6-1: config 0 descriptor?? [ 1198.359303][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1199.664774][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1199.670972][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1199.680593][ T7327] gspca_stk1135: Sensor write failed [ 1199.686794][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1199.693215][ T7327] gspca_stk1135: Sensor write failed [ 1199.698906][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1199.705787][ T7327] gspca_stk1135: Sensor read failed [ 1199.712049][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1199.718581][ T7327] gspca_stk1135: Sensor read failed [ 1199.723871][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1199.730590][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1199.737484][ T7327] gspca_stk1135: Sensor read failed [ 1199.743863][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1199.750748][ T7327] gspca_stk1135: Sensor read failed [ 1199.756015][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1199.762322][ T7327] gspca_stk1135: Sensor write failed [ 1199.767628][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1199.775615][ T7327] gspca_stk1135: Sensor write failed [ 1199.781208][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1199.788443][ T7327] usb 6-1: USB disconnect, device number 86 17:43:14 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) 17:43:14 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000016c0)=[{0x0}], 0x0, 0x0) 17:43:14 executing program 0: r0 = socket(0x28, 0x1, 0x0) getpeername$packet(r0, 0x0, 0x0) 17:43:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180), 0x0, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:14 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) syz_open_procfs(0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x4}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r3, 0x4, 0x46000) lseek(r3, 0x4200, 0x1) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) sendfile(r2, r2, &(0x7f0000000100), 0x8080ffffff7e) 17:43:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000300), 0x4) 17:43:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89ba", 0xa2, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:14 executing program 3: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0xffff, 0xa, 0x4, 0x100000, 0x100000, {0x77359400}, {0x5, 0x4, 0x3f, 0x40, 0x0, 0x40, "9418099b"}, 0x1, 0x3, @planes=&(0x7f0000000040)={0xa3, 0x8000, @mem_offset=0x1}, 0x40}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x88) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="a966f1e76a8f2ac27b1dfc97aa255d10ff093b127840db21f42049b30c9fe24e97e414566ccd8abcfd16d888b2cb4122ee0cda149d6cf8615b4510758e463bed86ba362ac58614693c16252fffda4fdbc6b3b414067ed65af10a73292f9a9e4b65d629b23e84aa185c99416c155d3622d48195fec4310e50c17cb1d2d5ec299656a56464b0fa6f113ad950", 0x8b, 0x9, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000200)={0xa00000, 0x4, 0x4}) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0x1000, 0x2}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x101080, 0x0) read$FUSE(r0, &(0x7f0000000700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$vxfs(&(0x7f00000003c0)='vxfs\x00', &(0x7f0000000400)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000440)="8da3e88207fe2df54150523d1ebf75d6dea21bbfae80472c93246b14c740b86bb5ddd96340fe03c9f832b9a425a7bf610efde2947b372713aa21b59bad96a41bf9e8373fcf2712ea32662bddd9713412e011ddec3bcca6e2158c659141616f27f96b974a4d649e718ace495c2f362cbe9b52c5e146c6e8ee2202cb417f0150b5de86aca70fd30767b13a79ba2f46ab9dec3c0bcae03aaac8560598ba9051dcc5bf792f83376a1a78b7b57595fd6c56dd3fa224e20f8fc7c57d844c3fd11befbf5c75e16f4ba38867482b35dc7f82952c1edb53ffe7ccb9a3f2ee415f813314a854a8e2c15a17472e843e18", 0xeb, 0x9}, {&(0x7f0000000540)="c2ec4c0b561ba4e8daeb5450fa48cf75a8f8a19f794b81f8c8c7f6e7cc36d7684ad03a678ad75b3338bccc4882f1f4db3ac5e40b904736cf36e354a262ad8cfe91e502224c9bad0c882571af64bc77e686945fbd5a151f84365307a6f8ff61095ec6850a1598a56890f164eeda71290640ddc78aa86c96caa06c1017bc61326c95c7e4ebb00347b48187e0d94e8858ddbeda3e7ce8bd6fb8018f728e5112329058819339695d0d159f2ab59f58e5763d8abf7c9c057d83e1", 0xb8, 0x99}, {&(0x7f0000000600)="ceb06d70f0a3a0fb2d9b7f6241380d4b5bfac78db2d96d731c4d2a7be98e9c20a98162cc7a04b1efc535e988e9", 0x2d}, {&(0x7f0000000640)="63150ab5c4648a3e5513d5a53f028be8a947b3cbb5d930d334d18b052a0bdd2c17cec6bafb4ef8730ef942e7b668", 0x2e, 0x101}], 0x8004, &(0x7f0000002740)={[{}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0x8001}}, {@subj_type={'subj_type', 0x3d, '/dev/bsg\x00'}}, {@euid_eq={'euid', 0x3d, r1}}]}) [ 1200.262341][ T35] audit: type=1804 audit(1612460594.626:851): pid=17235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1334/bus" dev="sda1" ino=14328 res=1 errno=0 17:43:14 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x14) 17:43:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89ba", 0xa2, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:14 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x14) [ 1200.404121][T17240] loop3: detected capacity change from 1 to 0 [ 1200.494675][ T7327] usb 6-1: new high-speed USB device number 87 using dummy_hcd [ 1200.744649][ T7327] usb 6-1: Using ep0 maxpacket: 8 [ 1200.867459][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1200.876764][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1200.893002][ T7327] usb 6-1: config 0 descriptor?? [ 1200.958666][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1202.244541][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1202.245631][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1202.262741][ T7327] gspca_stk1135: Sensor write failed [ 1202.271395][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1202.280805][ T7327] gspca_stk1135: Sensor write failed [ 1202.289648][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1202.299135][ T7327] gspca_stk1135: Sensor read failed [ 1202.304322][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1202.317183][ T7327] gspca_stk1135: Sensor read failed [ 1202.322365][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1202.335173][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1202.342541][ T7327] gspca_stk1135: Sensor read failed [ 1202.347788][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1202.355798][ T7327] gspca_stk1135: Sensor read failed [ 1202.361349][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1202.367807][ T7327] gspca_stk1135: Sensor write failed [ 1202.373087][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1202.379431][ T7327] gspca_stk1135: Sensor write failed [ 1202.385160][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1202.393812][ T7327] usb 6-1: USB disconnect, device number 87 17:43:17 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:17 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x14) 17:43:17 executing program 3: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0xffff, 0xa, 0x4, 0x100000, 0x100000, {0x77359400}, {0x5, 0x4, 0x3f, 0x40, 0x0, 0x40, "9418099b"}, 0x1, 0x3, @planes=&(0x7f0000000040)={0xa3, 0x8000, @mem_offset=0x1}, 0x40}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x88) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="a966f1e76a8f2ac27b1dfc97aa255d10ff093b127840db21f42049b30c9fe24e97e414566ccd8abcfd16d888b2cb4122ee0cda149d6cf8615b4510758e463bed86ba362ac58614693c16252fffda4fdbc6b3b414067ed65af10a73292f9a9e4b65d629b23e84aa185c99416c155d3622d48195fec4310e50c17cb1d2d5ec299656a56464b0fa6f113ad950", 0x8b, 0x9, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000200)={0xa00000, 0x4, 0x4}) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0x1000, 0x2}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x101080, 0x0) read$FUSE(r0, &(0x7f0000000700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$vxfs(&(0x7f00000003c0)='vxfs\x00', &(0x7f0000000400)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000440)="8da3e88207fe2df54150523d1ebf75d6dea21bbfae80472c93246b14c740b86bb5ddd96340fe03c9f832b9a425a7bf610efde2947b372713aa21b59bad96a41bf9e8373fcf2712ea32662bddd9713412e011ddec3bcca6e2158c659141616f27f96b974a4d649e718ace495c2f362cbe9b52c5e146c6e8ee2202cb417f0150b5de86aca70fd30767b13a79ba2f46ab9dec3c0bcae03aaac8560598ba9051dcc5bf792f83376a1a78b7b57595fd6c56dd3fa224e20f8fc7c57d844c3fd11befbf5c75e16f4ba38867482b35dc7f82952c1edb53ffe7ccb9a3f2ee415f813314a854a8e2c15a17472e843e18", 0xeb, 0x9}, {&(0x7f0000000540)="c2ec4c0b561ba4e8daeb5450fa48cf75a8f8a19f794b81f8c8c7f6e7cc36d7684ad03a678ad75b3338bccc4882f1f4db3ac5e40b904736cf36e354a262ad8cfe91e502224c9bad0c882571af64bc77e686945fbd5a151f84365307a6f8ff61095ec6850a1598a56890f164eeda71290640ddc78aa86c96caa06c1017bc61326c95c7e4ebb00347b48187e0d94e8858ddbeda3e7ce8bd6fb8018f728e5112329058819339695d0d159f2ab59f58e5763d8abf7c9c057d83e1", 0xb8, 0x99}, {&(0x7f0000000600)="ceb06d70f0a3a0fb2d9b7f6241380d4b5bfac78db2d96d731c4d2a7be98e9c20a98162cc7a04b1efc535e988e9", 0x2d}, {&(0x7f0000000640)="63150ab5c4648a3e5513d5a53f028be8a947b3cbb5d930d334d18b052a0bdd2c17cec6bafb4ef8730ef942e7b668", 0x2e, 0x101}], 0x8004, &(0x7f0000002740)={[{}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0x8001}}, {@subj_type={'subj_type', 0x3d, '/dev/bsg\x00'}}, {@euid_eq={'euid', 0x3d, r1}}]}) 17:43:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89ba", 0xa2, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:17 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) syz_open_procfs(0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x4}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r3, 0x4, 0x46000) lseek(r3, 0x4200, 0x1) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) sendfile(r2, r2, &(0x7f0000000100), 0x8080ffffff7e) 17:43:17 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x14) 17:43:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d2", 0xf3, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1202.802478][T17283] loop3: detected capacity change from 1 to 0 17:43:17 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x14) [ 1202.839587][ T35] audit: type=1804 audit(1612460597.206:852): pid=17292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1335/bus" dev="sda1" ino=14318 res=1 errno=0 17:43:17 executing program 3: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0xffff, 0xa, 0x4, 0x100000, 0x100000, {0x77359400}, {0x5, 0x4, 0x3f, 0x40, 0x0, 0x40, "9418099b"}, 0x1, 0x3, @planes=&(0x7f0000000040)={0xa3, 0x8000, @mem_offset=0x1}, 0x40}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x88) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="a966f1e76a8f2ac27b1dfc97aa255d10ff093b127840db21f42049b30c9fe24e97e414566ccd8abcfd16d888b2cb4122ee0cda149d6cf8615b4510758e463bed86ba362ac58614693c16252fffda4fdbc6b3b414067ed65af10a73292f9a9e4b65d629b23e84aa185c99416c155d3622d48195fec4310e50c17cb1d2d5ec299656a56464b0fa6f113ad950", 0x8b, 0x9, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000200)={0xa00000, 0x4, 0x4}) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0x1000, 0x2}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x101080, 0x0) read$FUSE(r0, &(0x7f0000000700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$vxfs(&(0x7f00000003c0)='vxfs\x00', &(0x7f0000000400)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000440)="8da3e88207fe2df54150523d1ebf75d6dea21bbfae80472c93246b14c740b86bb5ddd96340fe03c9f832b9a425a7bf610efde2947b372713aa21b59bad96a41bf9e8373fcf2712ea32662bddd9713412e011ddec3bcca6e2158c659141616f27f96b974a4d649e718ace495c2f362cbe9b52c5e146c6e8ee2202cb417f0150b5de86aca70fd30767b13a79ba2f46ab9dec3c0bcae03aaac8560598ba9051dcc5bf792f83376a1a78b7b57595fd6c56dd3fa224e20f8fc7c57d844c3fd11befbf5c75e16f4ba38867482b35dc7f82952c1edb53ffe7ccb9a3f2ee415f813314a854a8e2c15a17472e843e18", 0xeb, 0x9}, {&(0x7f0000000540)="c2ec4c0b561ba4e8daeb5450fa48cf75a8f8a19f794b81f8c8c7f6e7cc36d7684ad03a678ad75b3338bccc4882f1f4db3ac5e40b904736cf36e354a262ad8cfe91e502224c9bad0c882571af64bc77e686945fbd5a151f84365307a6f8ff61095ec6850a1598a56890f164eeda71290640ddc78aa86c96caa06c1017bc61326c95c7e4ebb00347b48187e0d94e8858ddbeda3e7ce8bd6fb8018f728e5112329058819339695d0d159f2ab59f58e5763d8abf7c9c057d83e1", 0xb8, 0x99}, {&(0x7f0000000600)="ceb06d70f0a3a0fb2d9b7f6241380d4b5bfac78db2d96d731c4d2a7be98e9c20a98162cc7a04b1efc535e988e9", 0x2d}, {&(0x7f0000000640)="63150ab5c4648a3e5513d5a53f028be8a947b3cbb5d930d334d18b052a0bdd2c17cec6bafb4ef8730ef942e7b668", 0x2e, 0x101}], 0x8004, &(0x7f0000002740)={[{}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0x8001}}, {@subj_type={'subj_type', 0x3d, '/dev/bsg\x00'}}, {@euid_eq={'euid', 0x3d, r1}}]}) 17:43:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d2", 0xf3, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:17 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x14) [ 1203.037873][T17305] loop3: detected capacity change from 1 to 0 [ 1203.064429][ T7327] usb 6-1: new high-speed USB device number 88 using dummy_hcd [ 1203.304410][ T7327] usb 6-1: Using ep0 maxpacket: 8 [ 1203.424439][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1203.433602][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1203.449391][ T7327] usb 6-1: config 0 descriptor?? [ 1203.496507][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1204.814307][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1204.820672][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1204.833636][ T7327] gspca_stk1135: Sensor write failed [ 1204.842379][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1204.851844][ T7327] gspca_stk1135: Sensor write failed [ 1204.860341][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1204.870116][ T7327] gspca_stk1135: Sensor read failed [ 1204.878202][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1204.887833][ T7327] gspca_stk1135: Sensor read failed [ 1204.893013][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1204.905886][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1204.912364][ T7327] gspca_stk1135: Sensor read failed [ 1204.923544][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1204.933190][ T7327] gspca_stk1135: Sensor read failed [ 1204.941714][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1204.952062][ T7327] gspca_stk1135: Sensor write failed [ 1204.960585][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1204.970229][ T7327] gspca_stk1135: Sensor write failed [ 1204.979022][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1204.989523][ T7327] usb 6-1: USB disconnect, device number 88 17:43:19 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d2", 0xf3, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:19 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x14) 17:43:19 executing program 3: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0xffff, 0xa, 0x4, 0x100000, 0x100000, {0x77359400}, {0x5, 0x4, 0x3f, 0x40, 0x0, 0x40, "9418099b"}, 0x1, 0x3, @planes=&(0x7f0000000040)={0xa3, 0x8000, @mem_offset=0x1}, 0x40}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x88) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="a966f1e76a8f2ac27b1dfc97aa255d10ff093b127840db21f42049b30c9fe24e97e414566ccd8abcfd16d888b2cb4122ee0cda149d6cf8615b4510758e463bed86ba362ac58614693c16252fffda4fdbc6b3b414067ed65af10a73292f9a9e4b65d629b23e84aa185c99416c155d3622d48195fec4310e50c17cb1d2d5ec299656a56464b0fa6f113ad950", 0x8b, 0x9, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000200)={0xa00000, 0x4, 0x4}) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0x1000, 0x2}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x101080, 0x0) read$FUSE(r0, &(0x7f0000000700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$vxfs(&(0x7f00000003c0)='vxfs\x00', &(0x7f0000000400)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000440)="8da3e88207fe2df54150523d1ebf75d6dea21bbfae80472c93246b14c740b86bb5ddd96340fe03c9f832b9a425a7bf610efde2947b372713aa21b59bad96a41bf9e8373fcf2712ea32662bddd9713412e011ddec3bcca6e2158c659141616f27f96b974a4d649e718ace495c2f362cbe9b52c5e146c6e8ee2202cb417f0150b5de86aca70fd30767b13a79ba2f46ab9dec3c0bcae03aaac8560598ba9051dcc5bf792f83376a1a78b7b57595fd6c56dd3fa224e20f8fc7c57d844c3fd11befbf5c75e16f4ba38867482b35dc7f82952c1edb53ffe7ccb9a3f2ee415f813314a854a8e2c15a17472e843e18", 0xeb, 0x9}, {&(0x7f0000000540)="c2ec4c0b561ba4e8daeb5450fa48cf75a8f8a19f794b81f8c8c7f6e7cc36d7684ad03a678ad75b3338bccc4882f1f4db3ac5e40b904736cf36e354a262ad8cfe91e502224c9bad0c882571af64bc77e686945fbd5a151f84365307a6f8ff61095ec6850a1598a56890f164eeda71290640ddc78aa86c96caa06c1017bc61326c95c7e4ebb00347b48187e0d94e8858ddbeda3e7ce8bd6fb8018f728e5112329058819339695d0d159f2ab59f58e5763d8abf7c9c057d83e1", 0xb8, 0x99}, {&(0x7f0000000600)="ceb06d70f0a3a0fb2d9b7f6241380d4b5bfac78db2d96d731c4d2a7be98e9c20a98162cc7a04b1efc535e988e9", 0x2d}, {&(0x7f0000000640)="63150ab5c4648a3e5513d5a53f028be8a947b3cbb5d930d334d18b052a0bdd2c17cec6bafb4ef8730ef942e7b668", 0x2e, 0x101}], 0x8004, &(0x7f0000002740)={[{}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0x8001}}, {@subj_type={'subj_type', 0x3d, '/dev/bsg\x00'}}, {@euid_eq={'euid', 0x3d, r1}}]}) 17:43:19 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) syz_open_procfs(0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x11c, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='htcp\x00', 0x5) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x14, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x104) [ 1205.341903][T17342] loop3: detected capacity change from 1 to 0 17:43:19 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10d001, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0xffff, 0xa, 0x4, 0x100000, 0x100000, {0x77359400}, {0x5, 0x4, 0x3f, 0x40, 0x0, 0x40, "9418099b"}, 0x1, 0x3, @planes=&(0x7f0000000040)={0xa3, 0x8000, @mem_offset=0x1}, 0x40}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x88) mq_timedsend(r0, &(0x7f0000000140)="a966f1e76a8f2ac27b1dfc97aa255d10ff093b127840db21f42049b30c9fe24e97e414566ccd8abcfd16d888b2cb4122ee0cda149d6cf8615b4510758e463bed86ba362ac58614693c16252fffda4fdbc6b3b414067ed65af10a73292f9a9e4b65d629b23e84aa185c99416c155d3622d48195fec4310e50c17cb1d2d5ec299656a56464b0fa6f113ad950", 0x8b, 0x9, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000200)={0xa00000, 0x4, 0x4}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x101080, 0x0) getpeername$l2tp6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000380)=0x20) read$FUSE(r1, &(0x7f0000000700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$vxfs(&(0x7f00000003c0)='vxfs\x00', &(0x7f0000000400)='./file0\x00', 0x7, 0x4, &(0x7f0000000680)=[{&(0x7f0000000440)="8da3e88207fe2df54150523d1ebf75d6dea21bbfae80472c93246b14c740b86bb5ddd96340fe03c9f832b9a425a7bf610efde2947b372713aa21b59bad96a41bf9e8373fcf2712ea32662bddd9713412e011ddec3bcca6e2158c659141616f27f96b974a4d649e718ace495c2f362cbe9b52c5e146c6e8ee2202cb417f0150b5de86aca70fd30767b13a79ba2f46ab9dec3c0bcae03aaac8560598ba9051dcc5bf792f83376a1a78b7b57595fd6c56dd3fa224e20f8fc7c57d844c3fd11befbf5c75e16f4ba38867482b35dc7f82952c1edb53ffe7ccb9a3f2ee415f813314a854a8e2c15a17472e843e18", 0xeb, 0x9}, {&(0x7f0000000540)="c2ec4c0b561ba4e8daeb5450fa48cf75a8f8a19f794b81f8c8c7f6e7cc36d7684ad03a678ad75b3338bccc4882f1f4db3ac5e40b904736cf36e354a262ad8cfe91e502224c9bad0c882571af64bc77e686945fbd5a151f84365307a6f8ff61095ec6850a1598a56890f164eeda71290640ddc78aa86c96caa06c1017bc61326c95c7e4ebb00347b48187e0d94e8858ddbeda3e7ce8bd6fb8018f728e5112329058819339695d0d159f2ab59f58e5763d8abf7c9c057d83e1", 0xb8, 0x99}, {&(0x7f0000000600)="ceb06d70f0a3a0fb2d9b7f6241380d4b5bfac78db2d96d731c4d2a7be98e9c20a98162cc7a04b1efc535e988e9", 0x2d}, {&(0x7f0000000640)="63150ab5c4648a3e5513d5a53f028be8a947b3cbb5d930d334d18b052a0bdd2c17cec6bafb4ef8730ef942e7b668", 0x2e, 0x101}], 0x8004, &(0x7f0000002740)={[{}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0x8001}}, {@subj_type={'subj_type', 0x3d, '/dev/bsg\x00'}}, {@euid_eq={'euid', 0x3d, r2}}]}) syz_genetlink_get_family_id$batadv(&(0x7f00000029c0)='batadv\x00') [ 1205.395572][ T35] audit: type=1804 audit(1612460599.766:853): pid=17347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1336/bus" dev="sda1" ino=14328 res=1 errno=0 17:43:19 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@name, 0x10) [ 1205.486095][T17358] loop3: detected capacity change from 1 to 0 17:43:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f", 0x11c, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1205.553270][T17363] loop3: detected capacity change from 1 to 0 17:43:20 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1205.614198][ T7327] usb 6-1: new high-speed USB device number 89 using dummy_hcd [ 1205.864192][ T7327] usb 6-1: Using ep0 maxpacket: 8 [ 1205.984730][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1205.994407][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1206.003700][ T7327] usb 6-1: config 0 descriptor?? [ 1206.057483][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1207.365432][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1207.371608][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1207.378323][ T7327] gspca_stk1135: Sensor write failed [ 1207.385518][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1207.393575][ T7327] gspca_stk1135: Sensor write failed [ 1207.399084][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1207.406616][ T7327] gspca_stk1135: Sensor read failed [ 1207.412225][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1207.419349][ T7327] gspca_stk1135: Sensor read failed [ 1207.425473][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1207.433321][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1207.440910][ T7327] gspca_stk1135: Sensor read failed [ 1207.446258][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1207.454988][ T7327] gspca_stk1135: Sensor read failed [ 1207.460230][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1207.466583][ T7327] gspca_stk1135: Sensor write failed [ 1207.477331][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1207.484309][ T7327] gspca_stk1135: Sensor write failed [ 1207.489707][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1207.498743][ T7327] usb 6-1: USB disconnect, device number 89 17:43:22 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:22 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = epoll_create1(0x0) r2 = dup2(r0, r1) dup(r2) 17:43:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x11c, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:22 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) write$FUSE_IOCTL(r0, 0x0, 0x0) 17:43:22 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) syz_open_procfs(0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x130, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x142) 17:43:22 executing program 0: timer_create(0x2, &(0x7f0000000200)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000240)) 17:43:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x130, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1207.946175][ T35] audit: type=1804 audit(1612460602.316:854): pid=17410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1337/bus" dev="sda1" ino=14335 res=1 errno=0 17:43:22 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = dup(r0) write$FUSE_INIT(r1, 0x0, 0xfffffffffffffee1) 17:43:22 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, 0x0) [ 1208.154558][T10422] usb 6-1: new high-speed USB device number 90 using dummy_hcd [ 1208.403992][T10422] usb 6-1: Using ep0 maxpacket: 8 [ 1208.524279][T10422] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1208.533367][T10422] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1208.548973][T10422] usb 6-1: config 0 descriptor?? [ 1208.595823][T10422] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1209.903873][T10422] gspca_stk1135: reg_w 0xd err -71 [ 1209.910098][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1209.918683][T10422] gspca_stk1135: Sensor write failed [ 1209.927390][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1209.935317][T10422] gspca_stk1135: Sensor write failed [ 1209.940683][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1209.947057][T10422] gspca_stk1135: Sensor read failed [ 1209.952874][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1209.961020][T10422] gspca_stk1135: Sensor read failed [ 1209.966229][T10422] gspca_stk1135: Detected sensor type unknown (0x0) [ 1209.972822][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1209.979145][T10422] gspca_stk1135: Sensor read failed [ 1209.985679][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1209.994158][T10422] gspca_stk1135: Sensor read failed [ 1209.999400][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1210.005858][T10422] gspca_stk1135: Sensor write failed [ 1210.012476][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1210.018826][T10422] gspca_stk1135: Sensor write failed [ 1210.024148][T10422] stk1135: probe of 6-1:0.0 failed with error -71 [ 1210.031331][T10422] usb 6-1: USB disconnect, device number 90 17:43:24 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f4ed41142483e4ff61baffffac9429dd9aa7cdc78", 0x130, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:24 executing program 3: clock_nanosleep(0x0, 0x1, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 17:43:24 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 17:43:24 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x13a, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:24 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) dup(r0) 17:43:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x13a, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:24 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002100)='/dev/full\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:43:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x13a, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1210.480652][ T35] audit: type=1804 audit(1612460604.847:855): pid=17461 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1338/bus" dev="sda1" ino=14321 res=1 errno=0 17:43:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/zero\x00', 0x80001, 0x0) write$P9_RSETATTR(r0, 0x0, 0x0) [ 1210.744450][T10422] usb 6-1: new high-speed USB device number 91 using dummy_hcd [ 1210.984005][T10422] usb 6-1: Using ep0 maxpacket: 8 [ 1211.104351][T10422] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1211.113623][T10422] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1211.131953][T10422] usb 6-1: config 0 descriptor?? [ 1211.188049][T10422] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1212.493622][T10422] gspca_stk1135: reg_w 0xd err -71 [ 1212.499772][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1212.512425][T10422] gspca_stk1135: Sensor write failed [ 1212.520881][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1212.530576][T10422] gspca_stk1135: Sensor write failed [ 1212.539416][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1212.549207][T10422] gspca_stk1135: Sensor read failed [ 1212.557554][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1212.567696][T10422] gspca_stk1135: Sensor read failed [ 1212.572884][T10422] gspca_stk1135: Detected sensor type unknown (0x0) [ 1212.586293][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1212.592908][T10422] gspca_stk1135: Sensor read failed [ 1212.604435][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1212.610918][T10422] gspca_stk1135: Sensor read failed [ 1212.623633][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1212.630324][T10422] gspca_stk1135: Sensor write failed [ 1212.635667][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1212.641976][T10422] gspca_stk1135: Sensor write failed [ 1212.650553][T10422] stk1135: probe of 6-1:0.0 failed with error -71 [ 1212.658562][T10422] usb 6-1: USB disconnect, device number 91 17:43:27 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:27 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) dup(r0) 17:43:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f4ed41142483e4ff61baffffac9429dd9aa7cdc78064d86ddcefb019c27ab4e2936bbf9", 0x13f, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:27 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40040, 0x0) dup(r0) 17:43:27 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:27 executing program 0: syz_emit_ethernet(0x22, &(0x7f0000000000)={@remote, @link_local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast2}}}}}, 0x0) 17:43:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x13f, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:27 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) dup(r0) 17:43:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x13f, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:27 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, 0x0, 0x0) 17:43:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x142, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1213.110482][ T35] audit: type=1804 audit(1612460607.467:856): pid=17518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1339/bus" dev="sda1" ino=14325 res=1 errno=0 [ 1213.363548][ T1961] usb 6-1: new high-speed USB device number 92 using dummy_hcd [ 1213.633649][ T1961] usb 6-1: Using ep0 maxpacket: 8 [ 1213.763758][ T1961] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1213.773214][ T1961] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1213.792697][ T1961] usb 6-1: config 0 descriptor?? [ 1213.847826][ T1961] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1215.134682][ T1961] gspca_stk1135: reg_w 0xd err -71 [ 1215.140819][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1215.155018][ T1961] gspca_stk1135: Sensor write failed [ 1215.160516][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1215.167030][ T1961] gspca_stk1135: Sensor write failed [ 1215.173236][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1215.183815][ T1961] gspca_stk1135: Sensor read failed [ 1215.189297][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1215.197863][ T1961] gspca_stk1135: Sensor read failed [ 1215.204595][ T1961] gspca_stk1135: Detected sensor type unknown (0x0) [ 1215.212345][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1215.219805][ T1961] gspca_stk1135: Sensor read failed [ 1215.225100][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1215.233178][ T1961] gspca_stk1135: Sensor read failed [ 1215.239753][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1215.246615][ T1961] gspca_stk1135: Sensor write failed [ 1215.252749][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1215.259115][ T1961] gspca_stk1135: Sensor write failed [ 1215.264737][ T1961] stk1135: probe of 6-1:0.0 failed with error -71 [ 1215.271957][ T1961] usb 6-1: USB disconnect, device number 92 17:43:30 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:30 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) dup(r0) 17:43:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) 17:43:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x142, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:30 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:30 executing program 0: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = dup(r0) dup2(r1, r1) 17:43:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101040, 0x0) 17:43:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x142, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:30 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x4081, 0x0) 17:43:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f4ed41142483e4ff61baffffac9429dd9aa7cdc78064d86ddcefb019c27ab4e2936bbf9e0efcc67", 0x143, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1215.732194][ T35] audit: type=1804 audit(1612460610.087:857): pid=17567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1340/bus" dev="sda1" ino=14322 res=1 errno=0 17:43:30 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r2, &(0x7f0000002180)={0x78, 0xb, r1}, 0x78) [ 1215.953591][ T1961] usb 6-1: new high-speed USB device number 93 using dummy_hcd [ 1216.223317][ T1961] usb 6-1: Using ep0 maxpacket: 8 [ 1216.353285][ T1961] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1216.362515][ T1961] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1216.373862][ T1961] usb 6-1: config 0 descriptor?? [ 1216.415652][ T1961] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1217.733378][ T1961] gspca_stk1135: reg_w 0xd err -71 [ 1217.739716][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1217.752486][ T1961] gspca_stk1135: Sensor write failed [ 1217.761080][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1217.771537][ T1961] gspca_stk1135: Sensor write failed [ 1217.779838][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1217.789654][ T1961] gspca_stk1135: Sensor read failed [ 1217.798473][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1217.808592][ T1961] gspca_stk1135: Sensor read failed [ 1217.817252][ T1961] gspca_stk1135: Detected sensor type unknown (0x0) [ 1217.827126][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1217.836439][ T1961] gspca_stk1135: Sensor read failed [ 1217.841663][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1217.854222][ T1961] gspca_stk1135: Sensor read failed [ 1217.859435][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1217.865895][ T1961] gspca_stk1135: Sensor write failed [ 1217.873221][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1217.879534][ T1961] gspca_stk1135: Sensor write failed [ 1217.884868][ T1961] stk1135: probe of 6-1:0.0 failed with error -71 [ 1217.893438][ T1961] usb 6-1: USB disconnect, device number 93 17:43:32 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:32 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000080)='-@(L*&.}\x00', 0x9) 17:43:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x143, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:32 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x80) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 17:43:32 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:32 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 17:43:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f4ed41142483e4ff61baffffac9429dd9aa7cdc78064d86ddcefb019c27ab4e2936bbf9e0efcc67", 0x143, 0x4040800, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) [ 1218.312741][ T35] audit: type=1804 audit(1612460612.667:858): pid=17618 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1341/bus" dev="sda1" ino=14347 res=1 errno=0 17:43:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff8}]}) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:43:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f4ed41142483e4ff61baffffac9429dd9aa7cdc78064d86ddcefb019c27ab4e2936bbf9e0efcc6719", 0x144, 0x0, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x144, 0x0, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:32 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xf6840, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x10001, 0x0, 0x0, "2973fb57b3734e7b0f1df251561ac917cc6df8"}) [ 1218.543266][ T7327] usb 6-1: new high-speed USB device number 94 using dummy_hcd [ 1218.833314][ T7327] usb 6-1: Using ep0 maxpacket: 8 [ 1218.973145][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1218.982430][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1218.993365][ T7327] usb 6-1: config 0 descriptor?? [ 1219.055580][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1220.342964][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1220.349112][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1220.361918][ T7327] gspca_stk1135: Sensor write failed [ 1220.370555][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1220.380240][ T7327] gspca_stk1135: Sensor write failed [ 1220.388885][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1220.398544][ T7327] gspca_stk1135: Sensor read failed [ 1220.406876][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1220.416389][ T7327] gspca_stk1135: Sensor read failed [ 1220.421573][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1220.433945][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1220.440279][ T7327] gspca_stk1135: Sensor read failed [ 1220.451940][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1220.461491][ T7327] gspca_stk1135: Sensor read failed [ 1220.469973][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1220.479532][ T7327] gspca_stk1135: Sensor write failed [ 1220.488138][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1220.497785][ T7327] gspca_stk1135: Sensor write failed [ 1220.506961][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1220.517694][ T7327] usb 6-1: USB disconnect, device number 94 17:43:35 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:35 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 17:43:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x144, 0x0, &(0x7f0000001880)=@qipcrtr={0x2a, 0x2}, 0x80) 17:43:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) 17:43:35 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x3c}}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="6535060000000000140012800b0001006970766c616e0000040002800a0005000400000000"], 0x48}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878255}, 0x9c) 17:43:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x144, 0x4040800, 0x0, 0x0) 17:43:35 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 1220.934396][T17671] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 1220.942775][T17671] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:43:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="e6b28c8c47e72f23c4eb9352d55945159d4a437a466d51f2d8906545fb9cf440b933d86a74235eea04fb37e839cf962328a5fd12a14c928c8af0ca0ddb84750a69461191733600115ff45b9a9f0fee72b278e143e5e4e9a5ee2472eb67b6628b98d26666415842291c79dd74077d205aa100c4b03cca2e018a935250bd330976e957e17fea642fe204cc6b87f643f44e09e5db9c7c511a4a30ec14f148c1029c89baebfbe24b092f64e4e4c57f376ec39a1bd92b18086d5e59de53266215a0189b48b72ee9cc05044b3d1f1cc46b9e2ca2d9202df7f64da5cabcfb4752e198425ce8c61c3d36ac5c6acb32f7866a407505a7d21f1df9a01722cb45e76d82c076cfa9455686eb30814cef8db28761d390d7dd6680055407c585cd8f4f4ed41142483e4ff61baffffac9429dd9aa7cdc78064d86ddcefb019c27ab4e2936bbf9e0efcc6719", 0x144, 0x4040800, 0x0, 0x0) [ 1220.977245][T17671] device ipvlan2 entered promiscuous mode 17:43:35 executing program 3: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 1221.015192][ T35] audit: type=1804 audit(1612460615.377:859): pid=17683 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1342/bus" dev="sda1" ino=14337 res=1 errno=0 17:43:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0x144, 0x4040800, 0x0, 0x0) [ 1221.092568][T17682] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 1221.122027][T17682] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1221.137873][T17682] device ipvlan3 entered promiscuous mode [ 1221.142895][ T4904] usb 6-1: new high-speed USB device number 95 using dummy_hcd [ 1221.382930][ T4904] usb 6-1: Using ep0 maxpacket: 8 [ 1221.503342][ T4904] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1221.512816][ T4904] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1221.522221][ T4904] usb 6-1: config 0 descriptor?? [ 1221.576217][ T4904] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1222.902744][ T4904] gspca_stk1135: reg_w 0xd err -71 [ 1222.908934][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1222.921992][ T4904] gspca_stk1135: Sensor write failed [ 1222.930518][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1222.940303][ T4904] gspca_stk1135: Sensor write failed [ 1222.948938][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1222.958388][ T4904] gspca_stk1135: Sensor read failed [ 1222.966696][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1222.976711][ T4904] gspca_stk1135: Sensor read failed [ 1222.982022][ T4904] gspca_stk1135: Detected sensor type unknown (0x0) [ 1222.995837][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1223.002297][ T4904] gspca_stk1135: Sensor read failed [ 1223.013618][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1223.019984][ T4904] gspca_stk1135: Sensor read failed [ 1223.025233][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1223.032847][ T4904] gspca_stk1135: Sensor write failed [ 1223.038549][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1223.044909][ T4904] gspca_stk1135: Sensor write failed [ 1223.050221][ T4904] stk1135: probe of 6-1:0.0 failed with error -71 [ 1223.057893][ T4904] usb 6-1: USB disconnect, device number 95 17:43:37 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr, 0x80) 17:43:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x3c}}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="6535060000000000140012800b0001006970766c616e0000040002800a0005000400000000"], 0x48}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878255}, 0x9c) 17:43:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@discard_size={'discard'}}, {@nointegrity='nointegrity'}]}) 17:43:37 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr, 0x80) 17:43:37 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000180), 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000001c0)=[{{}, {0x0, 0x0, 0x1, 0x1}}], 0x8) [ 1223.519228][T17729] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 1223.559129][T17729] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1223.578636][T17729] device ipvlan4 entered promiscuous mode 17:43:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f0000000180)="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", 0xfffffffffffffe63, 0x4040800, &(0x7f0000001880)=@qipcrtr, 0x80) [ 1223.611191][ T35] audit: type=1804 audit(1612460617.968:860): pid=17744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1343/bus" dev="sda1" ino=14325 res=1 errno=0 17:43:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104040c80ecdb4cb92e06480e000d000000e8bd6efb250309000e000100240248ff051005001201", 0x2e}], 0x1}, 0x0) 17:43:38 executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@map_acorn='map=acorn'}, {@map_off='map=off'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}]}) [ 1223.714342][ T4904] usb 6-1: new high-speed USB device number 96 using dummy_hcd 17:43:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)='\b', 0x1, r0) keyctl$clear(0x7, r0) [ 1223.807765][T17760] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1223.822374][T17760] bridge0: port 2(bridge_slave_1) entered disabled state [ 1223.829540][T17760] bridge0: port 1(bridge_slave_0) entered disabled state [ 1223.837611][T17760] device bridge0 entered promiscuous mode [ 1223.963501][ T4904] usb 6-1: Using ep0 maxpacket: 8 [ 1223.969041][T17760] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1224.024157][T17760] bridge0: port 2(bridge_slave_1) entered blocking state [ 1224.031224][T17760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1224.038485][T17760] bridge0: port 1(bridge_slave_0) entered blocking state [ 1224.045534][T17760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1224.087495][ T4904] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1224.110534][ T4904] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1224.125479][ T4904] usb 6-1: config 0 descriptor?? [ 1224.164820][ T4904] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1225.032540][ T1961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1225.482506][ T4904] gspca_stk1135: reg_w 0xd err -71 [ 1225.488751][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1225.495137][ T4904] gspca_stk1135: Sensor write failed [ 1225.500871][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1225.509767][ T4904] gspca_stk1135: Sensor write failed [ 1225.515217][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1225.521633][ T4904] gspca_stk1135: Sensor read failed [ 1225.526924][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1225.533286][ T4904] gspca_stk1135: Sensor read failed [ 1225.539060][ T4904] gspca_stk1135: Detected sensor type unknown (0x0) [ 1225.545708][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1225.552178][ T4904] gspca_stk1135: Sensor read failed [ 1225.557462][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1225.563814][ T4904] gspca_stk1135: Sensor read failed [ 1225.570265][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1225.576756][ T4904] gspca_stk1135: Sensor write failed [ 1225.582088][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1225.588629][ T4904] gspca_stk1135: Sensor write failed [ 1225.594021][ T4904] stk1135: probe of 6-1:0.0 failed with error -71 [ 1225.603192][ T4904] usb 6-1: USB disconnect, device number 96 17:43:40 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:40 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x805c6103, &(0x7f0000000080)) 17:43:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x2a, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 17:43:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104040c80ecdb4cb92e06480e000d000000e8bd6efb250309000e000100240248ff051005001201", 0x2e}], 0x1}, 0x0) 17:43:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000002000200012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r2, @ANYBLOB="00000000000000000e0000000a0001006261736963"], 0x94}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1226.009787][T17794] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1226.040086][T17800] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:43:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000004100)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 1226.054180][T17800] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.085672][T17794] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.086734][T17800] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.092770][T17794] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.128941][ T35] audit: type=1804 audit(1612460620.498:861): pid=17809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1344/bus" dev="sda1" ino=14347 res=1 errno=0 [ 1226.129904][T17811] input: syz1 as /devices/virtual/input/input64 [ 1226.253209][T17800] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.310748][T17824] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.321799][T17824] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.340946][ T4904] usb 6-1: new high-speed USB device number 97 using dummy_hcd 17:43:40 executing program 3: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f00000004c0)=[{0x0, 0x0, 0x1800}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) 17:43:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 17:43:40 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 1226.357968][T17807] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1226.399498][T17807] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.0'. 17:43:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000006c0)="080000000000000037595409d020ee89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f", 0x4a, r0) keyctl$clear(0x7, r0) [ 1226.592489][ T4904] usb 6-1: Using ep0 maxpacket: 8 [ 1226.712392][ T4904] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1226.726321][ T4904] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1226.754108][ T4904] usb 6-1: config 0 descriptor?? [ 1226.804344][ T4904] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1228.122247][ T4904] gspca_stk1135: reg_w 0xd err -71 [ 1228.128413][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1228.141578][ T4904] gspca_stk1135: Sensor write failed [ 1228.151295][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1228.161113][ T4904] gspca_stk1135: Sensor write failed [ 1228.169771][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1228.179819][ T4904] gspca_stk1135: Sensor read failed [ 1228.188754][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1228.198395][ T4904] gspca_stk1135: Sensor read failed [ 1228.207169][ T4904] gspca_stk1135: Detected sensor type unknown (0x0) [ 1228.217188][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1228.226587][ T4904] gspca_stk1135: Sensor read failed [ 1228.231829][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1228.245357][ T4904] gspca_stk1135: Sensor read failed [ 1228.250573][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1228.264264][ T4904] gspca_stk1135: Sensor write failed [ 1228.269600][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1228.282612][ T4904] gspca_stk1135: Sensor write failed [ 1228.287938][ T4904] stk1135: probe of 6-1:0.0 failed with error -71 [ 1228.295163][ T4904] usb 6-1: USB disconnect, device number 97 17:43:42 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128009000100626f6e6400000000100002800c0008800800070064"], 0x4c}}, 0x0) 17:43:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x29, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd8931"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 17:43:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:42 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) [ 1228.646748][T17867] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1228.667173][T17870] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 17:43:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x4000000a, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03206023e0e01a00000c513f7c25925e697b02f892f6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) gettid() syz_open_procfs(0x0, 0x0) 17:43:43 executing program 3: get_mempolicy(0x0, &(0x7f0000000040), 0x2, &(0x7f0000ffc000/0x2000)=nil, 0x2) [ 1228.696382][T17867] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1228.767467][ T35] audit: type=1804 audit(1612460623.128:862): pid=17915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1345/bus" dev="sda1" ino=14328 res=1 errno=0 17:43:43 executing program 3: r0 = eventfd2(0x5, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x53) [ 1228.920082][T17867] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:43 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0xd8c, 0x22, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000440)={0x14, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="002201"], 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000cc0)='/dev/usb/hiddev#\x00', 0x0, 0x121c60) read$hiddev(r1, &(0x7f0000000100)=""/136, 0x88) [ 1228.962584][ T1961] usb 6-1: new high-speed USB device number 98 using dummy_hcd 17:43:43 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) [ 1229.066152][T17935] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1229.097850][T17935] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1229.213527][ T1961] usb 6-1: Using ep0 maxpacket: 8 [ 1229.342187][ T1961] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1229.351577][ T1961] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1229.363386][ T9003] usb 3-1: new high-speed USB device number 120 using dummy_hcd [ 1229.380810][ T1961] usb 6-1: config 0 descriptor?? [ 1229.434308][ T1961] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1229.782136][ T9003] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1229.793142][ T9003] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1229.810042][ T9003] usb 3-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 1229.823071][ T9003] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1229.831680][ T9003] usb 3-1: config 0 descriptor?? [ 1230.402087][ T9003] usbhid 3-1:0.0: can't add hid device: -71 [ 1230.408254][ T9003] usbhid: probe of 3-1:0.0 failed with error -71 [ 1230.422970][ T9003] usb 3-1: USB disconnect, device number 120 [ 1230.763558][ T1961] gspca_stk1135: reg_w 0xd err -71 [ 1230.769712][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1230.776053][ T1961] gspca_stk1135: Sensor write failed [ 1230.782362][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1230.791186][ T1961] gspca_stk1135: Sensor write failed [ 1230.797616][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1230.804045][ T1961] gspca_stk1135: Sensor read failed [ 1230.810881][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1230.818294][ T1961] gspca_stk1135: Sensor read failed [ 1230.823554][ T1961] gspca_stk1135: Detected sensor type unknown (0x0) [ 1230.831070][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1230.837482][ T1961] gspca_stk1135: Sensor read failed [ 1230.844047][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1230.851837][ T1961] gspca_stk1135: Sensor read failed [ 1230.859961][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1230.866433][ T1961] gspca_stk1135: Sensor write failed [ 1230.871708][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1230.879650][ T1961] gspca_stk1135: Sensor write failed [ 1230.887417][ T1961] stk1135: probe of 6-1:0.0 failed with error -71 [ 1230.894921][ T1961] usb 6-1: USB disconnect, device number 98 [ 1231.071999][ T4904] usb 3-1: new high-speed USB device number 121 using dummy_hcd 17:43:45 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:45 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x2, 0x2, 0x5}, 0x14}}, 0x0) 17:43:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:43:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="7436619ef13ca8cd85c6037dbb94424265ba9d6b72474251f6776615604e36f83625505c4e64d73e126ad674600b746486c69a47b33f84d6af2b26cfd381e62c356ccb246f521dcef265f46f90e4b04b2d2ab06674c97d9ba7a84b2bc7afa87803a772383591dab6c19b858ebce6c929472b80fc3b2d3d354076f5d74f68f17e89aaf6583db2395661af632247de433db109c463ad59f7fe4093cfb28dd6c653947883fde07347a84b759b3d70543330bf97ae03613487a7a714ad426252088bd75c6ba7eabf2e077ef4fd6441fb6022800c9ad27bcedb20260bfb62593be27446a41f22185bf560819bafd49450bfba8eacde1b0b8ca86d6bf01e5a3634e5e758a14b31b2e86b3d69a7d93cb478bec1e1a2ba6594cfb2e511194ffe199a6e844e642a4ee2421bde02ca29832ad0469cc5dbaa806bd9753d18b9fa8bb8739f9c75ceb71134e881dc954d80c06dcace0021e776ee764a69db176d18cc56c1b6649293905c88c5958c40dfc9e90353b8826792b785878dcad86cee05c4d53af6f1e820eb165f5a976177e91c335f972088aaf5c24aa7990d5de1b4502e016d85bef0fd1c66924d19b5dde61872670ad3c37196c7", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) [ 1231.286973][T17981] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1231.317451][T17981] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1231.408637][ T35] audit: type=1804 audit(1612460625.768:863): pid=17992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1346/bus" dev="sda1" ino=14348 res=1 errno=0 [ 1231.442366][ T4904] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1231.475931][ T4904] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1231.493680][T17996] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1231.537156][ T4904] usb 3-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.40 [ 1231.537614][T17996] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="7436619ef13ca8cd85c6037dbb94424265ba9d6b72474251f6776615604e36f83625505c4e64d73e126ad674600b746486c69a47b33f84d6af2b26cfd381e62c356ccb246f521dcef265f46f90e4b04b2d2ab06674c97d9ba7a84b2bc7afa87803a772383591dab6c19b858ebce6c929472b80fc3b2d3d354076f5d74f68f17e89aaf6583db2395661af632247de433db109c463ad59f7fe4093cfb28dd6c653947883fde07347a84b759b3d70543330bf97ae03613487a7a714ad426252088bd75c6ba7eabf2e077ef4fd6441fb6022800c9ad27bcedb20260bfb62593be27446a41f22185bf560819bafd49450bfba8eacde1b0b8ca86d6bf01e5a3634e5e758a14b31b2e86b3d69a7d93cb478bec1e1a2ba6594cfb2e511194ffe199a6e844e642a4ee2421bde02ca29832ad0469cc5dbaa806bd9753d18b9fa8bb8739f9c75ceb71134e881dc954d80c06dcace0021e776ee764a69db176d18cc56c1b6649293905c88c5958c40dfc9e90353b8826792b785878dcad86cee05c4d53af6f1e820eb165f5a976177e91c335f972088aaf5c24aa7990d5de1b4502e016d85bef0fd1c66924d19b5dde61872670ad3c37196c7", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) [ 1231.578604][ T4904] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1231.592492][ T1961] usb 6-1: new high-speed USB device number 99 using dummy_hcd [ 1231.602734][ T4904] usb 3-1: config 0 descriptor?? 17:43:46 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1231.832626][T18011] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1231.881969][ T1961] usb 6-1: Using ep0 maxpacket: 8 17:43:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="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", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) 17:43:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1231.961976][ T4904] usbhid 3-1:0.0: can't add hid device: -71 [ 1231.971061][ T4904] usbhid: probe of 3-1:0.0 failed with error -71 [ 1231.992545][ T4904] usb 3-1: USB disconnect, device number 121 [ 1232.032989][ T1961] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1232.053976][ T1961] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1232.103643][ T1961] usb 6-1: config 0 descriptor?? [ 1232.185081][ T1961] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1233.511797][ T1961] gspca_stk1135: reg_w 0xd err -71 [ 1233.518077][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1233.524602][ T1961] gspca_stk1135: Sensor write failed [ 1233.532504][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1233.539504][ T1961] gspca_stk1135: Sensor write failed [ 1233.546522][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1233.552905][ T1961] gspca_stk1135: Sensor read failed [ 1233.559181][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1233.567041][ T1961] gspca_stk1135: Sensor read failed [ 1233.572284][ T1961] gspca_stk1135: Detected sensor type unknown (0x0) [ 1233.578924][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1233.585343][ T1961] gspca_stk1135: Sensor read failed [ 1233.590561][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1233.596942][ T1961] gspca_stk1135: Sensor read failed [ 1233.602608][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1233.609160][ T1961] gspca_stk1135: Sensor write failed [ 1233.614651][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1233.621009][ T1961] gspca_stk1135: Sensor write failed [ 1233.628190][ T1961] stk1135: probe of 6-1:0.0 failed with error -71 [ 1233.635660][ T1961] usb 6-1: USB disconnect, device number 99 17:43:48 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="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", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) 17:43:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="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", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) 17:43:48 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) [ 1234.039699][T18054] validate_nla: 1 callbacks suppressed [ 1234.039712][T18054] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1234.176129][ T35] audit: type=1804 audit(1612460628.539:864): pid=18067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1347/bus" dev="sda1" ino=14320 res=1 errno=0 [ 1234.221011][T18068] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1234.230001][T18068] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:48 executing program 1: timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="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", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) 17:43:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1234.351930][ T9003] usb 6-1: new high-speed USB device number 100 using dummy_hcd [ 1234.397450][T18073] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1234.423388][T18073] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:48 executing program 1: timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:48 executing program 1: timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 1234.621814][ T9003] usb 6-1: Using ep0 maxpacket: 8 [ 1234.762384][ T9003] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1234.777422][ T9003] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1234.796310][ T9003] usb 6-1: config 0 descriptor?? [ 1234.853650][ T9003] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1236.141578][ T9003] gspca_stk1135: reg_w 0xd err -71 [ 1236.147959][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1236.160441][ T9003] gspca_stk1135: Sensor write failed [ 1236.169107][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1236.179034][ T9003] gspca_stk1135: Sensor write failed [ 1236.187346][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1236.196584][ T9003] gspca_stk1135: Sensor read failed [ 1236.205244][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1236.215106][ T9003] gspca_stk1135: Sensor read failed [ 1236.220531][ T9003] gspca_stk1135: Detected sensor type unknown (0x0) [ 1236.233791][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1236.240112][ T9003] gspca_stk1135: Sensor read failed [ 1236.251774][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1236.258119][ T9003] gspca_stk1135: Sensor read failed [ 1236.263525][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1236.270861][ T9003] gspca_stk1135: Sensor write failed [ 1236.276341][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1236.282694][ T9003] gspca_stk1135: Sensor write failed [ 1236.288079][ T9003] stk1135: probe of 6-1:0.0 failed with error -71 [ 1236.295427][ T9003] usb 6-1: USB disconnect, device number 100 17:43:51 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:51 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="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", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) 17:43:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="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", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) 17:43:51 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 1236.661099][T18112] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1236.696535][T18112] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:51 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 1236.798320][ T35] audit: type=1804 audit(1612460631.159:865): pid=18128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1348/bus" dev="sda1" ino=14351 res=1 errno=0 17:43:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="7436619ef13ca8cd85c6037dbb94424265ba9d6b72474251f6776615604e36f83625505c4e64d73e126ad674600b746486c69a47b33f84d6af2b26cfd381e62c356ccb246f521dcef265f46f90e4b04b2d2ab06674c97d9ba7a84b2bc7afa87803a772383591dab6c19b858ebce6c929472b80fc3b2d3d354076f5d74f68f17e89aaf6583db2395661af632247de433db109c463ad59f7fe4093cfb28dd6c653947883fde07347a84b759b3d70543330bf97ae03613487a7a714ad426252088bd75c6ba7eabf2e077ef4fd6441fb6022800c9ad27bcedb20260bfb62593be27446a41f22185bf560819bafd49450bfba8eacde1b0b8ca86d6bf01e5a3634e5e758a14b31b2e86b3d69a7d93cb478bec1e1a2ba6594cfb2e511194ffe199a6e844e642a4ee2421bde02ca29832ad0469cc5dbaa806bd9753d18b9fa8bb8739f9c75ceb71134e881dc954d80c06dcace0021e776ee764a69db176d18cc56c1b6649293905c88c5958c40dfc9e90353b8826792b785878dcad86cee05c4d53af6f1e820eb165f5a976177e91c335f972088aaf5c24aa7990d5de1b4502e016d85bef0fd1c66924d19b5dde61872670ad3c37196c7", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) 17:43:51 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 1236.925002][T18135] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1236.952484][ T7327] usb 6-1: new high-speed USB device number 101 using dummy_hcd [ 1236.961620][T18135] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:51 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 1237.211467][ T7327] usb 6-1: Using ep0 maxpacket: 8 [ 1237.331730][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1237.341098][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1237.356489][ T7327] usb 6-1: config 0 descriptor?? [ 1237.403870][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1238.721401][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1238.727563][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1238.735915][ T7327] gspca_stk1135: Sensor write failed [ 1238.743360][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1238.750114][ T7327] gspca_stk1135: Sensor write failed [ 1238.755456][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1238.763335][ T7327] gspca_stk1135: Sensor read failed [ 1238.769348][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1238.775798][ T7327] gspca_stk1135: Sensor read failed [ 1238.780980][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1238.787710][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1238.795584][ T7327] gspca_stk1135: Sensor read failed [ 1238.801371][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1238.807808][ T7327] gspca_stk1135: Sensor read failed [ 1238.813051][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1238.819462][ T7327] gspca_stk1135: Sensor write failed [ 1238.825132][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1238.831640][ T7327] gspca_stk1135: Sensor write failed [ 1238.837026][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1238.844678][ T7327] usb 6-1: USB disconnect, device number 101 17:43:53 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 17:43:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) 17:43:53 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="ae250f7a3a75e55409ccf28e0bf035ac5c17c8670b7bc399cee42faea115edd1ac83eea60d482565655c3f67655af5e4ab022e43fa066bdc3ca93e7748c83a4748ed528be13c813927bf0f262981bb1e60e4113de73c", 0x56}, {&(0x7f0000001340)="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", 0x1b3}], 0x2}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f65e3b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) [ 1239.249652][T18169] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:53 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000001140), &(0x7f0000001180)=0x10) 17:43:53 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:53 executing program 3: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) munlock(&(0x7f0000ffa000/0x5000)=nil, 0x5000) [ 1239.306683][T18169] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1239.371475][ T35] audit: type=1804 audit(1612460633.739:866): pid=18183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1349/bus" dev="sda1" ino=14339 res=1 errno=0 17:43:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:53 executing program 3: clock_getres(0x0, &(0x7f0000001e00)) [ 1239.581417][ T7327] usb 6-1: new high-speed USB device number 102 using dummy_hcd [ 1239.591954][T18196] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1239.633816][T18196] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:54 executing program 2: shmget(0x2, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) 17:43:54 executing program 3: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 17:43:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:43:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1239.851236][ T7327] usb 6-1: Using ep0 maxpacket: 8 [ 1239.878617][T18207] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1239.908455][T18207] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1239.991682][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1240.001650][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1240.013767][ T7327] usb 6-1: config 0 descriptor?? [ 1240.063368][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 17:43:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x46000) lseek(r4, 0x4200, 0x1) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r7, 0x0, 0x8400fffffffb) sendfile(r3, r3, &(0x7f0000000100), 0x8080ffffff7e) [ 1240.304510][ T35] audit: type=1804 audit(1612460634.669:867): pid=18218 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1350/bus" dev="sda1" ino=14325 res=1 errno=0 [ 1241.371126][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1241.377419][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1241.390213][ T7327] gspca_stk1135: Sensor write failed [ 1241.398995][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1241.409015][ T7327] gspca_stk1135: Sensor write failed [ 1241.417961][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1241.427591][ T7327] gspca_stk1135: Sensor read failed [ 1241.435991][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1241.445744][ T7327] gspca_stk1135: Sensor read failed [ 1241.450977][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1241.463942][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1241.470278][ T7327] gspca_stk1135: Sensor read failed [ 1241.482011][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1241.488424][ T7327] gspca_stk1135: Sensor read failed [ 1241.493658][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1241.500049][ T7327] gspca_stk1135: Sensor write failed [ 1241.506463][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1241.512821][ T7327] gspca_stk1135: Sensor write failed [ 1241.518147][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1241.525784][ T7327] usb 6-1: USB disconnect, device number 102 17:43:56 executing program 5: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 17:43:56 executing program 3: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 17:43:56 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000000)={0x0, 0xff}, 0x8) 17:43:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:56 executing program 4: r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:43:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) getsockname$unix(r2, 0x0, 0x0) 17:43:56 executing program 3: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) [ 1241.906643][T18239] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1241.949941][T18239] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f00000017c0), &(0x7f0000001800)=0x8) 17:43:56 executing program 3: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) [ 1242.031261][ T35] audit: type=1804 audit(1612460636.389:868): pid=18249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1351/bus" dev="sda1" ino=14322 res=1 errno=0 17:43:56 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), 0xb) 17:43:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1242.160471][T18261] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1242.212657][T18261] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:56 executing program 5: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 17:43:56 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x3f, 0xaa, 0x0, 0x2, 0x2, 0x81, 0x6, 0x0, 0x40, 0x1, 0x9}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000100)=0xb) 17:43:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000)={r2}, 0x8) 17:43:56 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:57 executing program 4: r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:43:57 executing program 2: r0 = socket(0x1c, 0x5, 0x0) connect(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 17:43:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f00000002c0), &(0x7f0000000300)=0x18) 17:43:57 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:57 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:57 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 17:43:57 executing program 5: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 17:43:57 executing program 3: r0 = socket(0x1c, 0x5, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000040), 0x4) 17:43:57 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:57 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x3f, 0x0, 0x7f, 0x2, 0x2, 0x81, 0x6, 0x0, 0x40, 0x1, 0x9}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000100)=0xb) [ 1243.008226][ T35] audit: type=1804 audit(1612460637.369:869): pid=18314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1352/bus" dev="sda1" ino=14328 res=1 errno=0 17:43:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 17:43:58 executing program 4: r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:43:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000200), &(0x7f00000002c0)=0x94) 17:43:58 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x23, &(0x7f0000000000), &(0x7f00000000c0)=0x8c) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)=ANY=[], 0x8c) 17:43:58 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:58 executing program 5: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:58 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 17:43:58 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) getsockname(r0, 0x0, &(0x7f00000000c0)) 17:43:58 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x2}, 0xc) sendmsg$inet_sctp(r0, &(0x7f0000001640)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001600)=[{&(0x7f00000014c0)="a2", 0x1}], 0x1}, 0x0) 17:43:58 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:58 executing program 3: socketpair(0xa, 0x1, 0xa, &(0x7f0000000000)) [ 1243.996426][ T35] audit: type=1804 audit(1612460638.359:870): pid=18366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1353/bus" dev="sda1" ino=14347 res=1 errno=0 17:43:59 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:43:59 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c) 17:43:59 executing program 0: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:59 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, @val, {@ipv4}}, 0x0) 17:43:59 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 17:43:59 executing program 5: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:43:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffde88, 0x1f}, 0x14) [ 1244.821492][T18392] validate_nla: 8 callbacks suppressed [ 1244.821504][T18392] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:43:59 executing program 0: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:43:59 executing program 2: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000080), 0x8) 17:43:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd}, 0xb) 17:43:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000140), &(0x7f0000000200)=0x98) 17:43:59 executing program 0: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1244.931250][T18405] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1245.030645][ T35] audit: type=1804 audit(1612460639.390:871): pid=18416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1354/bus" dev="sda1" ino=14347 res=1 errno=0 [ 1245.058346][T18418] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:00 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:00 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f0000000240), 0x4) 17:44:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 17:44:00 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 17:44:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:00 executing program 5: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:00 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0xe26, 0x9d}, 0x10) [ 1245.829904][T18433] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1}, 0x0) 17:44:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:00 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040), &(0x7f0000000180)=0xc) 17:44:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a00)={&(0x7f0000000480)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000008c0)=[{&(0x7f00000004c0)="c3", 0x1}], 0x1, &(0x7f0000000940)=[@authinfo={0x10}], 0x10}, 0x0) [ 1245.925127][T18444] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1246.010713][ T35] audit: type=1804 audit(1612460640.370:872): pid=18451 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1355/bus" dev="sda1" ino=14334 res=1 errno=0 [ 1246.024281][T18455] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:01 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000080), &(0x7f0000000000)=0xb0) 17:44:01 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x40}, {r0, 0x2008}, {r2, 0x40}, {r0, 0x4}, {r0}], 0x5, &(0x7f0000000080)={0x7}, 0x0, 0x0) 17:44:01 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 17:44:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180), 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:01 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x0, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:01 executing program 3: r0 = socket(0x1c, 0x5, 0x0) connect(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000200)={0x1, [0x0]}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f00000000c0)={r1}, &(0x7f0000000000)=0xb0) 17:44:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180), 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1246.816210][T18477] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:01 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c) getsockname(r0, 0x0, &(0x7f00000010c0)) 17:44:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180), 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1246.896623][T18489] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1246.961738][ T35] audit: type=1804 audit(1612460641.330:873): pid=18493 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1356/bus" dev="sda1" ino=14334 res=1 errno=0 [ 1247.000011][T18497] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x0, 0x1, '>'}, 0x9) 17:44:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1247.102700][ T1961] usb 6-1: new high-speed USB device number 103 using dummy_hcd [ 1247.117818][T18509] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1247.290607][ T1961] usb 6-1: device descriptor read/64, error 18 [ 1247.560612][ T1961] usb 6-1: new high-speed USB device number 104 using dummy_hcd 17:44:02 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x1, 0x0, 0x1}, 0x98) 17:44:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), 0x8c) 17:44:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:02 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 1247.750579][ T1961] usb 6-1: device descriptor read/64, error 18 [ 1247.870665][ T1961] usb usb6-port1: attempt power cycle [ 1247.920561][ T35] audit: type=1804 audit(1612460642.280:874): pid=18533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1357/bus" dev="sda1" ino=14322 res=1 errno=0 [ 1248.580509][ T1961] usb 6-1: new high-speed USB device number 105 using dummy_hcd [ 1248.670516][ T1961] usb 6-1: Invalid ep0 maxpacket: 0 [ 1248.820482][ T1961] usb 6-1: new high-speed USB device number 106 using dummy_hcd [ 1248.910494][ T1961] usb 6-1: Invalid ep0 maxpacket: 0 [ 1248.915915][ T1961] usb usb6-port1: unable to enumerate USB device 17:44:04 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 17:44:04 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x0, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:04 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000000), 0x8) 17:44:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000000), &(0x7f00000000c0)=0x8) 17:44:04 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f00000004c0)=0xfff, 0x4) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/69, 0x45}, 0x1) 17:44:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000), 0xb) 17:44:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, &(0x7f0000000140), 0x4) 17:44:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1249.904203][T18563] validate_nla: 2 callbacks suppressed [ 1249.904287][T18563] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:04 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 17:44:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 1249.967756][ T35] audit: type=1804 audit(1612460644.330:875): pid=18572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1358/bus" dev="sda1" ino=14321 res=1 errno=0 [ 1250.005960][T18575] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1250.310403][ T9003] usb 6-1: new high-speed USB device number 107 using dummy_hcd [ 1250.530339][ T9003] usb 6-1: device descriptor read/64, error 18 [ 1250.800331][ T9003] usb 6-1: new high-speed USB device number 108 using dummy_hcd [ 1250.990303][ T9003] usb 6-1: device descriptor read/64, error 18 [ 1251.110499][ T9003] usb usb6-port1: attempt power cycle [ 1251.840244][ T9003] usb 6-1: new high-speed USB device number 109 using dummy_hcd [ 1251.931812][ T9003] usb 6-1: Invalid ep0 maxpacket: 0 [ 1252.090230][ T9003] usb 6-1: new high-speed USB device number 110 using dummy_hcd [ 1252.210601][ T9003] usb 6-1: Invalid ep0 maxpacket: 0 [ 1252.215879][ T9003] usb usb6-port1: unable to enumerate USB device 17:44:07 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x0, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:07 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 17:44:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000040)=0x2b9, 0x4) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000380)="9b", 0x1}], 0x1, 0x0, 0x10}, 0x0) 17:44:07 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x10, &(0x7f0000000600)=0x1, 0x4) 17:44:07 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000000)={0x0, 0x2, "b087"}, &(0x7f0000000080)=0xa) [ 1252.884536][T18596] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025", 0x1d}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:07 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) sendmsg(r0, &(0x7f0000000200)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[{0x10}, {0x10}], 0x20}, 0x0) 17:44:07 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000080), 0xc) 17:44:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) 17:44:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/122, 0x7a}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/86, 0x56}, {0x0}, {0x0}], 0x3}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x2769, 0x0, 0x0, 0x800e00507) shutdown(r3, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r5, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r4, 0x0) [ 1252.991594][T18620] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1253.045819][ T35] audit: type=1804 audit(1612460647.410:876): pid=18625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1359/bus" dev="sda1" ino=14329 res=1 errno=0 [ 1253.320155][ T4904] usb 6-1: new high-speed USB device number 111 using dummy_hcd [ 1253.510125][ T4904] usb 6-1: device descriptor read/64, error 18 [ 1253.780224][ T4904] usb 6-1: new high-speed USB device number 112 using dummy_hcd [ 1253.970101][ T4904] usb 6-1: device descriptor read/64, error 18 [ 1254.090190][ T4904] usb usb6-port1: attempt power cycle [ 1254.800035][ T4904] usb 6-1: new high-speed USB device number 113 using dummy_hcd [ 1254.890359][ T4904] usb 6-1: Invalid ep0 maxpacket: 0 [ 1255.039985][ T4904] usb 6-1: new high-speed USB device number 114 using dummy_hcd [ 1255.130322][ T4904] usb 6-1: Invalid ep0 maxpacket: 0 [ 1255.135751][ T4904] usb usb6-port1: unable to enumerate USB device 17:44:10 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, 0x14) 17:44:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025", 0x1d}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:10 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 17:44:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:10 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)="ff", 0x1}], 0x1, &(0x7f0000000400)=[{0x10}, {0x10}], 0x20}, 0x0) 17:44:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xf}, 0xc) [ 1255.928885][T18656] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025", 0x1d}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="b1", 0x1}], 0x1, &(0x7f00000014c0)=[{0x10}, {0x10}], 0x20}, 0x105) 17:44:10 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000280), 0x8) 17:44:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x98) [ 1256.018611][T18672] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad00020000", 0x2b}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1256.077334][ T35] audit: type=1804 audit(1612460650.440:877): pid=18679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1360/bus" dev="sda1" ino=14347 res=1 errno=0 [ 1256.131591][T18683] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1256.429877][ T9003] usb 6-1: new high-speed USB device number 115 using dummy_hcd [ 1256.700348][ T9003] usb 6-1: Using ep0 maxpacket: 8 [ 1256.839882][ T9003] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1256.849384][ T9003] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1256.869734][ T9003] usb 6-1: config 0 descriptor?? [ 1256.923116][ T9003] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1258.239775][ T9003] gspca_stk1135: reg_w 0xd err -71 [ 1258.246011][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1258.252604][ T9003] gspca_stk1135: Sensor write failed [ 1258.259578][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1258.267027][ T9003] gspca_stk1135: Sensor write failed [ 1258.272619][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1258.279139][ T9003] gspca_stk1135: Sensor read failed [ 1258.284513][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1258.292514][ T9003] gspca_stk1135: Sensor read failed [ 1258.297872][ T9003] gspca_stk1135: Detected sensor type unknown (0x0) [ 1258.304848][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1258.312813][ T9003] gspca_stk1135: Sensor read failed [ 1258.318023][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1258.324789][ T9003] gspca_stk1135: Sensor read failed [ 1258.331076][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1258.339148][ T9003] gspca_stk1135: Sensor write failed [ 1258.344880][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1258.352312][ T9003] gspca_stk1135: Sensor write failed [ 1258.357874][ T9003] stk1135: probe of 6-1:0.0 failed with error -71 [ 1258.365544][ T9003] usb 6-1: USB disconnect, device number 115 17:44:13 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:13 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 17:44:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x0, 0xfffffffffffffdcf, "3e7072159527059ac03096f7e4a882f4eb78595137752fd6ba5ba288586415d5480833bd626076ac7a584549f333a874ffae8269e59859f63c7752a768025b9eb4f5d3dea9153821e174b0cb5771c29e45d9ae70ee8e3805449b8eb27ff19deafba4127145c73fa6b7eb313e03c72ed432d3d6775c4e9289eb0cc05012f280d434b3f38bb78222b7baa505c6a57deb7bc4f91ff93cb660fab68ced40ab931a854537327130c852d8cf565ea8b569617164a52b3637810efea38a602bf6ecfcc82d89ae72ccb28e93ebfc9915da344a12324222230da78cde1a45c043a05ab93105fb45d7c6e4fb2241e48c024aba7bd113"}, 0xf9) 17:44:13 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r1) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) dup2(r2, r0) 17:44:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad00020000", 0x2b}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000080)=""/132, 0x84}], 0x4) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) r5 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r4, 0x0) 17:44:13 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000100)=0xb) 17:44:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad00020000", 0x2b}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1258.785007][T18714] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:13 executing program 1: syz_emit_ethernet(0x27, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) 17:44:13 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 17:44:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6}, 0x10) [ 1258.870160][T18736] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1258.890483][ T35] audit: type=1804 audit(1612460653.261:878): pid=18738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1361/bus" dev="sda1" ino=14334 res=1 errno=0 [ 1259.079661][ T4904] usb 6-1: new high-speed USB device number 116 using dummy_hcd [ 1259.319678][ T4904] usb 6-1: Using ep0 maxpacket: 8 [ 1259.439663][ T4904] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1259.449043][ T4904] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1259.461162][ T4904] usb 6-1: config 0 descriptor?? [ 1259.501864][ T4904] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1260.819586][ T4904] gspca_stk1135: reg_w 0xd err -71 [ 1260.826348][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1260.839290][ T4904] gspca_stk1135: Sensor write failed [ 1260.848281][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1260.858955][ T4904] gspca_stk1135: Sensor write failed [ 1260.867620][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1260.877218][ T4904] gspca_stk1135: Sensor read failed [ 1260.886315][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1260.896705][ T4904] gspca_stk1135: Sensor read failed [ 1260.905212][ T4904] gspca_stk1135: Detected sensor type unknown (0x0) [ 1260.915269][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1260.925282][ T4904] gspca_stk1135: Sensor read failed [ 1260.931303][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1260.939123][ T4904] gspca_stk1135: Sensor read failed [ 1260.944727][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1260.951145][ T4904] gspca_stk1135: Sensor write failed [ 1260.958305][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1260.966797][ T4904] gspca_stk1135: Sensor write failed [ 1260.972150][ T4904] stk1135: probe of 6-1:0.0 failed with error -71 [ 1260.980019][ T4904] usb 6-1: USB disconnect, device number 116 17:44:15 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad0002000000000000060400", 0x32}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:15 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 17:44:15 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x0, 0x0, 0x181}, 0x98) 17:44:15 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:44:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r2}, 0x10) 17:44:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)="b1", 0x1}], 0x1}, 0x0) [ 1261.347912][T18785] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f00000000c0), 0xc) 17:44:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad0002000000000000060400", 0x32}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:15 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000200)=ANY=[], &(0x7f00000000c0)=0x98) 17:44:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x31}, 0x8) [ 1261.468075][T18802] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1261.485053][ T35] audit: type=1804 audit(1612460655.851:879): pid=18801 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1362/bus" dev="sda1" ino=14318 res=1 errno=0 [ 1261.659523][T12010] usb 6-1: new high-speed USB device number 117 using dummy_hcd [ 1261.899392][T12010] usb 6-1: Using ep0 maxpacket: 8 [ 1262.019915][T12010] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1262.029256][T12010] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1262.045669][T12010] usb 6-1: config 0 descriptor?? [ 1262.093649][T12010] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1263.399924][T12010] gspca_stk1135: reg_w 0xd err -71 [ 1263.406195][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1263.414589][T12010] gspca_stk1135: Sensor write failed [ 1263.423217][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1263.431085][T12010] gspca_stk1135: Sensor write failed [ 1263.436370][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1263.442773][T12010] gspca_stk1135: Sensor read failed [ 1263.448663][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1263.457107][T12010] gspca_stk1135: Sensor read failed [ 1263.462323][T12010] gspca_stk1135: Detected sensor type unknown (0x0) [ 1263.468953][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1263.475398][T12010] gspca_stk1135: Sensor read failed [ 1263.480669][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1263.487076][T12010] gspca_stk1135: Sensor read failed [ 1263.492868][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1263.499360][T12010] gspca_stk1135: Sensor write failed [ 1263.504637][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1263.510981][T12010] gspca_stk1135: Sensor write failed [ 1263.516468][T12010] stk1135: probe of 6-1:0.0 failed with error -71 [ 1263.525241][T12010] usb 6-1: USB disconnect, device number 117 17:44:18 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f00000002c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000001780)=[{&(0x7f0000000100)="d9", 0x1}], 0x1, &(0x7f0000000040)=[@authinfo={0x10}], 0x10}, 0x0) 17:44:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad0002000000000000060400", 0x32}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:18 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="05"]) 17:44:18 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v3, 0x18, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 17:44:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x4, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000200)) 17:44:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000180)={0x2, 0x0, 0x11, &(0x7f0000000280)="b2771a07876647b7f64d7eb8b254e2ada0"}) [ 1263.927364][T18838] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x2, 0x0, 0x300) 17:44:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000", 0x36}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:18 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 17:44:18 executing program 3: syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x1, &(0x7f0000002480)=[{&(0x7f0000000200)="8d55", 0x2, 0x7fffffff}], 0x0, 0x0) [ 1264.052609][T18857] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1264.072848][ T35] audit: type=1804 audit(1612460658.441:880): pid=18855 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1363/bus" dev="sda1" ino=14337 res=1 errno=0 [ 1264.151963][T18864] loop3: detected capacity change from 264192 to 0 [ 1264.209203][ T9316] usb 6-1: new high-speed USB device number 118 using dummy_hcd [ 1264.499188][ T9316] usb 6-1: Using ep0 maxpacket: 8 [ 1264.629461][ T9316] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1264.638556][ T9316] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1264.649085][ T9316] usb 6-1: config 0 descriptor?? [ 1264.711084][ T9316] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1266.009250][ T9316] gspca_stk1135: reg_w 0xd err -71 [ 1266.015389][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1266.026994][ T9316] gspca_stk1135: Sensor write failed [ 1266.033936][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1266.043662][ T9316] gspca_stk1135: Sensor write failed [ 1266.049433][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1266.055782][ T9316] gspca_stk1135: Sensor read failed [ 1266.063105][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1266.071961][ T9316] gspca_stk1135: Sensor read failed [ 1266.077244][ T9316] gspca_stk1135: Detected sensor type unknown (0x0) [ 1266.085294][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1266.092087][ T9316] gspca_stk1135: Sensor read failed [ 1266.097309][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1266.105047][ T9316] gspca_stk1135: Sensor read failed [ 1266.111915][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1266.118226][ T9316] gspca_stk1135: Sensor write failed [ 1266.124926][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1266.131667][ T9316] gspca_stk1135: Sensor write failed [ 1266.136987][ T9316] stk1135: probe of 6-1:0.0 failed with error -71 [ 1266.146857][ T9316] usb 6-1: USB disconnect, device number 118 17:44:20 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x80000001, 'syz1\x00'}) 17:44:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000", 0x36}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:20 executing program 1: add_key$keyring(&(0x7f0000000780)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 17:44:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="02757100950000004000da6e000000008510"], &(0x7f0000000280)='GPL\x00', 0x7, 0xb4, &(0x7f00000002c0)=""/180, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:44:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="800064"], 0x80}}, 0x0) 17:44:20 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) 17:44:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x80000001, 'syz1\x00'}) [ 1266.544414][T18895] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000", 0x36}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:21 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_names\x00') [ 1266.628335][T18907] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1266.646490][T18912] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x77359400}, 0x10) [ 1266.681681][ T35] audit: type=1804 audit(1612460661.051:881): pid=18913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1364/bus" dev="sda1" ino=14322 res=1 errno=0 [ 1266.698112][T18907] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1266.716835][T18907] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1266.807312][T18907] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1266.829183][T10432] usb 6-1: new high-speed USB device number 119 using dummy_hcd [ 1266.886918][T18907] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1266.907381][T18907] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1267.098992][T10432] usb 6-1: Using ep0 maxpacket: 8 [ 1267.249317][T10432] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1267.258450][T10432] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1267.270144][T10432] usb 6-1: config 0 descriptor?? [ 1267.312896][T10432] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1268.608843][T10432] gspca_stk1135: reg_w 0xd err -71 [ 1268.615417][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1268.625932][T10432] gspca_stk1135: Sensor write failed [ 1268.634361][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1268.642709][T10432] gspca_stk1135: Sensor write failed [ 1268.649741][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1268.656259][T10432] gspca_stk1135: Sensor read failed [ 1268.663399][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1268.672944][T10432] gspca_stk1135: Sensor read failed [ 1268.678129][T10432] gspca_stk1135: Detected sensor type unknown (0x0) [ 1268.686274][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1268.694596][T10432] gspca_stk1135: Sensor read failed [ 1268.701718][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1268.708052][T10432] gspca_stk1135: Sensor read failed [ 1268.715364][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1268.723190][T10432] gspca_stk1135: Sensor write failed [ 1268.728612][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1268.734979][T10432] gspca_stk1135: Sensor write failed [ 1268.740402][T10432] stk1135: probe of 6-1:0.0 failed with error -71 [ 1268.748433][T10432] usb 6-1: USB disconnect, device number 119 17:44:23 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad0002000000000000060400000000000000", 0x38}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:23 executing program 3: perf_event_open(&(0x7f0000001b00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:44:23 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0xa550, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x105) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind(r0, &(0x7f0000000040)=@hci={0x1f, 0x1, 0x2}, 0x80) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3, 0x0, "7900000000000000008000000000000000000000000200000000000000000000000000000000000000a8a4c0270000000000000000000000070000000000f7fff408ffffffff00"}, 0xd8) recvmsg(r0, 0x0, 0x2160) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000280)={{0x3}}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 17:44:23 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) 17:44:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:23 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_RMID(0x0, 0x0) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/8) [ 1269.128352][T18952] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1269.134805][T18950] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1269.155888][T18952] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. 17:44:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad0002000000000000060400000000000000", 0x38}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1269.180561][T18952] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 17:44:23 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$nl_xfrm(0x10, 0x3, 0x6) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x200}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfffa) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) [ 1269.237642][T18968] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:23 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) 17:44:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad0002000000000000060400000000000000", 0x38}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1269.322725][ T35] audit: type=1804 audit(1612460663.692:882): pid=18973 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1365/bus" dev="sda1" ino=14354 res=1 errno=0 [ 1269.374974][T18980] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 17:44:23 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) [ 1269.458149][T18980] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1269.467760][T18980] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1269.488376][ T9003] usb 6-1: new high-speed USB device number 120 using dummy_hcd [ 1269.658544][T18991] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1269.709435][T18991] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1269.723137][T18991] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1269.778729][ T9003] usb 6-1: Using ep0 maxpacket: 8 [ 1269.918986][ T9003] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1269.941460][ T9003] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1269.951545][ T9003] usb 6-1: config 0 descriptor?? [ 1270.010721][ T9003] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1270.370918][T18972] device bridge0 left promiscuous mode [ 1270.972847][T18972] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1271.028682][T18972] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1271.328645][ T9003] gspca_stk1135: reg_w 0xd err -71 [ 1271.334859][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1271.347369][ T9003] gspca_stk1135: Sensor write failed [ 1271.353905][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1271.360445][ T9003] gspca_stk1135: Sensor write failed [ 1271.365910][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1271.372494][ T9003] gspca_stk1135: Sensor read failed [ 1271.380225][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1271.386549][ T9003] gspca_stk1135: Sensor read failed [ 1271.392025][ T9003] gspca_stk1135: Detected sensor type unknown (0x0) [ 1271.398862][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1271.405184][ T9003] gspca_stk1135: Sensor read failed [ 1271.410837][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1271.417147][ T9003] gspca_stk1135: Sensor read failed [ 1271.422630][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1271.429119][ T9003] gspca_stk1135: Sensor write failed [ 1271.434439][ T9003] gspca_stk1135: serial bus timeout: status=0x00 [ 1271.441092][ T9003] gspca_stk1135: Sensor write failed [ 1271.446695][ T9003] stk1135: probe of 6-1:0.0 failed with error -71 [ 1271.455604][ T9003] usb 6-1: USB disconnect, device number 120 [ 1271.709229][T18972] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1271.718274][T18972] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1271.728174][T18972] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1271.743363][T18972] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 17:44:26 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:26 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) 17:44:26 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0xa550, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x105) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind(r0, &(0x7f0000000040)=@hci={0x1f, 0x1, 0x2}, 0x80) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3, 0x0, "7900000000000000008000000000000000000000000200000000000000000000000000000000000000a8a4c0270000000000000000000000070000000000f7fff408ffffffff00"}, 0xd8) recvmsg(r0, 0x0, 0x2160) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000280)={{0x3}}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 17:44:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:26 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) [ 1271.961931][T18972] device wlan1 left promiscuous mode 17:44:26 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) [ 1272.198810][ T9316] usb 6-1: new high-speed USB device number 121 using dummy_hcd 17:44:26 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) [ 1272.273492][T18987] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:26 executing program 3: syz_mount_image$udf(&(0x7f0000002980)='udf\x00', &(0x7f00000029c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002b80), 0x0, &(0x7f0000002c00)={[{@mode={'mode'}}, {@uid_ignore='uid=ignore'}, {@anchor={'anchor'}}]}) 17:44:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1272.429182][T19050] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1272.488746][ T9316] usb 6-1: Using ep0 maxpacket: 8 [ 1272.575173][T19050] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:27 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) 17:44:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:27 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0xa550, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x105) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind(r0, &(0x7f0000000040)=@hci={0x1f, 0x1, 0x2}, 0x80) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3, 0x0, "7900000000000000008000000000000000000000000200000000000000000000000000000000000000a8a4c0270000000000000000000000070000000000f7fff408ffffffff00"}, 0xd8) recvmsg(r0, 0x0, 0x2160) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000280)={{0x3}}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) [ 1272.709038][ T9316] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1272.732386][ T9316] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1272.778186][ T9316] usb 6-1: config 0 descriptor?? [ 1272.797514][T19069] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1272.830530][ T9316] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1272.847045][T19069] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1273.721550][T14474] device Z0 left promiscuous mode [ 1273.758548][T14474] device Z1 left promiscuous mode [ 1274.128402][ T9316] gspca_stk1135: reg_w 0xd err -71 [ 1274.134562][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1274.144492][ T9316] gspca_stk1135: Sensor write failed [ 1274.150017][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1274.157759][ T9316] gspca_stk1135: Sensor write failed [ 1274.164800][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1274.171485][ T9316] gspca_stk1135: Sensor read failed [ 1274.177670][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1274.185504][ T9316] gspca_stk1135: Sensor read failed [ 1274.190928][ T9316] gspca_stk1135: Detected sensor type unknown (0x0) [ 1274.197601][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1274.204009][ T9316] gspca_stk1135: Sensor read failed [ 1274.210366][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1274.217245][ T9316] gspca_stk1135: Sensor read failed [ 1274.222582][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1274.229160][ T9316] gspca_stk1135: Sensor write failed [ 1274.234497][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1274.240844][ T9316] gspca_stk1135: Sensor write failed [ 1274.246376][ T9316] stk1135: probe of 6-1:0.0 failed with error -71 [ 1274.254775][ T9316] usb 6-1: USB disconnect, device number 121 [ 1274.379169][T14474] IPVS: stopping master sync thread 6494 ... [ 1274.484471][T14474] device hsr_slave_0 left promiscuous mode [ 1274.490758][T14474] device hsr_slave_1 left promiscuous mode [ 1274.497000][T14474] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1274.504937][T14474] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1274.516247][T14474] device bridge_slave_1 left promiscuous mode [ 1274.523446][T14474] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.530858][T14474] device bridge_slave_0 left promiscuous mode [ 1274.536982][T14474] bridge0: port 1(bridge_slave_0) entered disabled state 17:44:29 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) 17:44:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:29 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 17:44:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:29 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0xa550, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x105) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind(r0, &(0x7f0000000040)=@hci={0x1f, 0x1, 0x2}, 0x80) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3, 0x0, "7900000000000000008000000000000000000000000200000000000000000000000000000000000000a8a4c0270000000000000000000000070000000000f7fff408ffffffff00"}, 0xd8) recvmsg(r0, 0x0, 0x2160) fcntl$setstatus(r0, 0x4, 0x2000) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000280)={{0x3}}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) [ 1274.742212][T14474] bond1 (unregistering): (slave bridge2): Releasing active interface [ 1274.775648][ T35] kauditd_printk_skb: 1 callbacks suppressed [ 1274.775660][ T35] audit: type=1804 audit(1612460669.142:884): pid=19154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1367/bus" dev="sda1" ino=14172 res=1 errno=0 [ 1274.853481][T14474] bond1 (unregistering): (slave bridge1): Releasing active interface 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) [ 1274.944952][T14474] bond1 (unregistering): Released all slaves [ 1274.968532][ T9316] usb 6-1: new high-speed USB device number 122 using dummy_hcd 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c75746638"]) [ 1275.182775][T14474] team0 (unregistering): Port device team_slave_1 removed 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) [ 1275.228062][T14474] team0 (unregistering): Port device team_slave_0 removed [ 1275.228277][ T9316] usb 6-1: Using ep0 maxpacket: 8 [ 1275.273198][T14474] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1275.317403][T14474] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 17:44:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) [ 1275.408658][ T9316] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1275.434370][ T9316] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1275.515778][ T9316] usb 6-1: config 0 descriptor?? 17:44:29 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_INFO(r0, 0xc08c5102, 0x0) [ 1275.550540][T14474] bond0 (unregistering): Released all slaves [ 1275.580422][ T9316] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1275.601419][T19135] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1275.641373][T19153] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1276.868189][ T9316] gspca_stk1135: reg_w 0xd err -71 [ 1276.874342][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1276.880745][ T9316] gspca_stk1135: Sensor write failed [ 1276.886746][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1276.895908][ T9316] gspca_stk1135: Sensor write failed [ 1276.901692][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1276.908865][ T9316] gspca_stk1135: Sensor read failed [ 1276.914308][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1276.920661][ T9316] gspca_stk1135: Sensor read failed [ 1276.927199][ T9316] gspca_stk1135: Detected sensor type unknown (0x0) [ 1276.935575][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1276.942005][ T9316] gspca_stk1135: Sensor read failed [ 1276.947996][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1276.954361][ T9316] gspca_stk1135: Sensor read failed [ 1276.961218][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1276.967646][ T9316] gspca_stk1135: Sensor write failed [ 1276.973795][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1276.980343][ T9316] gspca_stk1135: Sensor write failed [ 1276.986441][ T9316] stk1135: probe of 6-1:0.0 failed with error -71 [ 1276.994247][ T9316] usb 6-1: USB disconnect, device number 122 17:44:31 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973ad626d50d658ff5e5dae"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:31 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) [ 1277.499362][ T35] audit: type=1804 audit(1612460671.872:885): pid=19207 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1368/bus" dev="sda1" ino=14219 res=1 errno=0 [ 1277.648644][ T9316] usb 6-1: new high-speed USB device number 123 using dummy_hcd [ 1277.888093][ T9316] usb 6-1: Using ep0 maxpacket: 8 [ 1278.008236][ T9316] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1278.019965][ T9316] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1278.038459][ T9316] usb 6-1: config 0 descriptor?? [ 1278.145318][ T9316] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1279.273119][T19218] IPVS: ftp: loaded support on port[0] = 21 [ 1279.337615][T19218] chnl_net:caif_netlink_parms(): no params data found [ 1279.369210][T19218] bridge0: port 1(bridge_slave_0) entered blocking state [ 1279.376373][T19218] bridge0: port 1(bridge_slave_0) entered disabled state [ 1279.384338][T19218] device bridge_slave_0 entered promiscuous mode [ 1279.397492][T19218] bridge0: port 2(bridge_slave_1) entered blocking state [ 1279.404776][T19218] bridge0: port 2(bridge_slave_1) entered disabled state [ 1279.413074][T19218] device bridge_slave_1 entered promiscuous mode [ 1279.427512][T19218] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1279.440257][T19218] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1279.450447][ T9316] gspca_stk1135: reg_w 0xd err -71 [ 1279.456767][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1279.466707][ T9316] gspca_stk1135: Sensor write failed [ 1279.474806][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1279.480505][T19218] team0: Port device team_slave_0 added [ 1279.482059][ T9316] gspca_stk1135: Sensor write failed [ 1279.495493][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1279.496582][T19218] team0: Port device team_slave_1 added [ 1279.502516][ T9316] gspca_stk1135: Sensor read failed [ 1279.517211][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1279.523630][T19218] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1279.525269][ T9316] gspca_stk1135: Sensor read failed [ 1279.539387][ T9316] gspca_stk1135: Detected sensor type unknown (0x0) [ 1279.546487][T19218] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1279.547473][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1279.584088][ T9316] gspca_stk1135: Sensor read failed [ 1279.590561][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1279.598496][T19218] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1279.599714][ T9316] gspca_stk1135: Sensor read failed [ 1279.616624][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1279.622374][T19218] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1279.624573][ T9316] gspca_stk1135: Sensor write failed [ 1279.637332][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1279.637471][T19218] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1279.645363][ T9316] gspca_stk1135: Sensor write failed [ 1279.669828][T19218] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1279.686136][ T9316] stk1135: probe of 6-1:0.0 failed with error -71 [ 1279.699023][T19218] device hsr_slave_0 entered promiscuous mode [ 1279.702872][ T9316] usb 6-1: USB disconnect, device number 123 [ 1279.714194][T19218] device hsr_slave_1 entered promiscuous mode [ 1279.729601][T19218] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1279.737173][T19218] Cannot create hsr debugfs directory [ 1279.766176][T19218] bridge0: port 2(bridge_slave_1) entered blocking state [ 1279.773284][T19218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1279.780535][T19218] bridge0: port 1(bridge_slave_0) entered blocking state [ 1279.788933][T19218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1279.822482][T19218] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1279.833977][ T1961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1279.844670][ T1961] bridge0: port 1(bridge_slave_0) entered disabled state [ 1279.853612][ T1961] bridge0: port 2(bridge_slave_1) entered disabled state [ 1279.864258][ T1961] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1279.878157][T19218] 8021q: adding VLAN 0 to HW filter on device team0 [ 1279.888664][T10432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1279.896987][T10432] bridge0: port 1(bridge_slave_0) entered blocking state [ 1279.904101][T10432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1279.929239][T10432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1279.937586][T10432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1279.944615][T10432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1279.954657][T10432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1279.964124][T10432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1279.974571][T10432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1279.983988][T10432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1279.992394][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1280.004021][T19218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1280.032333][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1280.042121][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1280.061072][T19218] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1280.108930][ T9316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1280.117750][ T9316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1280.130135][ T9316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1280.140101][ T9316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1280.150135][T19218] device veth0_vlan entered promiscuous mode [ 1280.161489][T19218] device veth1_vlan entered promiscuous mode [ 1280.180156][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1280.191753][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1280.199844][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1280.216481][T19218] device veth0_macvtap entered promiscuous mode [ 1280.225369][T19218] device veth1_macvtap entered promiscuous mode [ 1280.241117][T19218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1280.251563][T19218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.263516][T19218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1280.275164][T19218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.285229][T19218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1280.295792][T19218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.305668][T19218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1280.316119][T19218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.317534][T19218] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1280.336165][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1280.345516][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1280.357432][T19218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1280.368089][T19218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.380360][T19218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1280.392483][T19218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.402434][T19218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1280.413109][T19218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.424589][T19218] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1280.435181][T19218] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1280.447947][T19218] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1280.455728][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1280.464586][ T7327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1280.510413][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1280.519821][ T474] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1280.533930][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1280.537400][ T474] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1280.550929][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 17:44:34 executing program 3: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xf) 17:44:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/147, 0x93}], 0x1, 0x7, 0x0) 17:44:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:34 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[]) 17:44:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:34 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) [ 1280.563088][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1280.589908][T19459] input: syz1 as /devices/virtual/input/input66 17:44:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/ipx\x00') 17:44:35 executing program 2: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) [ 1280.641134][T19471] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1280.658295][T19476] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1280.680183][T19471] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:35 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[]) 17:44:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:35 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) [ 1280.754746][ T35] audit: type=1804 audit(1612460675.122:886): pid=19488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1369/bus" dev="sda1" ino=14323 res=1 errno=0 17:44:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = getpgid(0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x22, 0x7ff, 0x3, 0x100, 0x0, 0x4, 0x7, 0x10001}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(r1, &(0x7f0000000200)={0x38, 0x2, 0xc, 0x1, 0x8, 0x9, 0x2, 0xffffffffffff86b0, 0x4, 0x8}, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) [ 1280.821929][T19494] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1280.846351][T19494] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1280.847311][T19495] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:44:35 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) 17:44:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1280.938345][ T4904] usb 6-1: new high-speed USB device number 124 using dummy_hcd 17:44:35 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[]) 17:44:35 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) [ 1281.045742][T19512] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1281.102619][T19512] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1281.116740][T19516] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1281.217823][ T4904] usb 6-1: Using ep0 maxpacket: 8 [ 1281.338096][ T9316] Bluetooth: hci3: command 0x0409 tx timeout [ 1281.358150][ T4904] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1281.368850][ T4904] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1281.394272][ T4904] usb 6-1: config 0 descriptor?? [ 1281.460222][ T4904] gspca_main: stk1135-2.14.0 probing 174f:6a31 17:44:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1281.557353][T19530] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1281.570404][T19530] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1282.727684][ T4904] gspca_stk1135: reg_w 0xd err -71 [ 1282.733844][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1282.747127][ T4904] gspca_stk1135: Sensor write failed [ 1282.755528][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1282.764687][ T4904] gspca_stk1135: Sensor write failed [ 1282.773322][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1282.783149][ T4904] gspca_stk1135: Sensor read failed [ 1282.792020][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1282.801479][ T4904] gspca_stk1135: Sensor read failed [ 1282.806679][ T4904] gspca_stk1135: Detected sensor type unknown (0x0) [ 1282.820289][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1282.826837][ T4904] gspca_stk1135: Sensor read failed [ 1282.838806][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1282.845259][ T4904] gspca_stk1135: Sensor read failed [ 1282.850647][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1282.858213][ T4904] gspca_stk1135: Sensor write failed [ 1282.863831][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1282.870218][ T4904] gspca_stk1135: Sensor write failed [ 1282.875542][ T4904] stk1135: probe of 6-1:0.0 failed with error -71 [ 1282.882717][ T4904] usb 6-1: USB disconnect, device number 124 17:44:37 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:37 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) 17:44:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:37 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB]) 17:44:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = getpgid(0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x22, 0x7ff, 0x3, 0x100, 0x0, 0x4, 0x7, 0x10001}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(r1, &(0x7f0000000200)={0x38, 0x2, 0xc, 0x1, 0x8, 0x9, 0x2, 0xffffffffffff86b0, 0x4, 0x8}, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 17:44:37 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) [ 1283.261623][T19548] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1283.265498][T19551] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1283.281480][T19548] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:37 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB]) [ 1283.367991][ T35] audit: type=1804 audit(1612460677.743:887): pid=19565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1370/bus" dev="sda1" ino=14334 res=1 errno=0 17:44:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:37 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) [ 1283.417673][ T9003] Bluetooth: hci3: command 0x041b tx timeout [ 1283.438680][T19569] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:44:37 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB]) [ 1283.537614][ T9316] usb 6-1: new high-speed USB device number 125 using dummy_hcd 17:44:37 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) [ 1283.612392][T19579] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1283.797789][ T9316] usb 6-1: Using ep0 maxpacket: 8 [ 1283.927706][ T9316] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1283.937841][ T9316] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1283.957359][ T9316] usb 6-1: config 0 descriptor?? [ 1284.014199][ T9316] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1285.317498][ T9316] gspca_stk1135: reg_w 0xd err -71 [ 1285.323857][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1285.333636][ T9316] gspca_stk1135: Sensor write failed [ 1285.340261][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1285.349420][ T9316] gspca_stk1135: Sensor write failed [ 1285.354698][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1285.361139][ T9316] gspca_stk1135: Sensor read failed [ 1285.366878][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1285.377549][ T9316] gspca_stk1135: Sensor read failed [ 1285.382735][ T9316] gspca_stk1135: Detected sensor type unknown (0x0) [ 1285.390530][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1285.399449][ T9316] gspca_stk1135: Sensor read failed [ 1285.404984][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1285.412551][ T9316] gspca_stk1135: Sensor read failed [ 1285.418752][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1285.425064][ T9316] gspca_stk1135: Sensor write failed [ 1285.431617][ T9316] gspca_stk1135: serial bus timeout: status=0x00 [ 1285.438820][ T9316] gspca_stk1135: Sensor write failed [ 1285.444108][ T9316] stk1135: probe of 6-1:0.0 failed with error -71 [ 1285.453113][ T9316] usb 6-1: USB disconnect, device number 125 [ 1285.497612][ T9003] Bluetooth: hci3: command 0x040f tx timeout 17:44:40 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x000']) 17:44:40 executing program 3: socket$inet6(0xa, 0x0, 0x555a3c30) 17:44:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = getpgid(0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x22, 0x7ff, 0x3, 0x100, 0x0, 0x4, 0x7, 0x10001}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(r1, &(0x7f0000000200)={0x38, 0x2, 0xc, 0x1, 0x8, 0x9, 0x2, 0xffffffffffff86b0, 0x4, 0x8}, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 17:44:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:40 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={r2}, 0x8) [ 1285.845966][T19615] validate_nla: 2 callbacks suppressed [ 1285.845979][T19615] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1285.873291][T19617] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1285.887712][T19615] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1285.929802][T19617] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 17:44:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1285.944396][T19617] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1285.970331][ T35] audit: type=1804 audit(1612460680.343:888): pid=19626 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1371/bus" dev="sda1" ino=14334 res=1 errno=0 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x000']) [ 1286.085302][T19636] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1286.086460][T19637] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1286.113576][T19636] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1286.116707][ T4904] usb 6-1: new high-speed USB device number 126 using dummy_hcd 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x000']) [ 1286.152498][T19637] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 1286.172085][T19637] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 17:44:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1286.269448][T19643] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1286.290359][T19643] ntfs: (device loop1): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 1286.309365][T19643] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1286.328350][T19648] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1286.340848][T19648] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:40 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x0000000000000001,fmask=0000000000000']) [ 1286.407381][ T4904] usb 6-1: Using ep0 maxpacket: 8 [ 1286.527559][ T4904] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1286.537679][ T4904] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1286.566810][ T4904] usb 6-1: config 0 descriptor?? [ 1286.633152][ T4904] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1287.587300][T10432] Bluetooth: hci3: command 0x0419 tx timeout [ 1287.917304][ T4904] gspca_stk1135: reg_w 0xd err -71 [ 1287.923569][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1287.936458][ T4904] gspca_stk1135: Sensor write failed [ 1287.945006][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1287.954571][ T4904] gspca_stk1135: Sensor write failed [ 1287.963259][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1287.969627][ T4904] gspca_stk1135: Sensor read failed [ 1287.974888][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1287.981248][ T4904] gspca_stk1135: Sensor read failed [ 1287.986816][ T4904] gspca_stk1135: Detected sensor type unknown (0x0) [ 1287.993453][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1287.999795][ T4904] gspca_stk1135: Sensor read failed [ 1288.005020][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1288.011388][ T4904] gspca_stk1135: Sensor read failed [ 1288.016856][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1288.025165][ T4904] gspca_stk1135: Sensor write failed [ 1288.031062][ T4904] gspca_stk1135: serial bus timeout: status=0x00 [ 1288.037523][ T4904] gspca_stk1135: Sensor write failed [ 1288.042812][ T4904] stk1135: probe of 6-1:0.0 failed with error -71 [ 1288.050177][ T4904] usb 6-1: USB disconnect, device number 126 17:44:42 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:42 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x0000000000000001,fmask=0000000000000']) 17:44:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = getpgid(0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x22, 0x7ff, 0x3, 0x100, 0x0, 0x4, 0x7, 0x10001}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(r1, &(0x7f0000000200)={0x38, 0x2, 0xc, 0x1, 0x8, 0x9, 0x2, 0xffffffffffff86b0, 0x4, 0x8}, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 17:44:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:42 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = getpid() kcmp(r1, r2, 0x0, r0, 0xffffffffffffffff) [ 1288.444254][T19683] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1288.455409][T19683] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:42 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) accept4$tipc(r0, 0x0, 0x0, 0x0) 17:44:42 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x0000000000000001,fmask=0000000000000']) 17:44:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000180)='net/bnep\x00') 17:44:42 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000200001,disabl']) [ 1288.619048][T19704] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1288.649925][T19704] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1288.787183][T12010] usb 6-1: new high-speed USB device number 127 using dummy_hcd [ 1289.037222][T12010] usb 6-1: Using ep0 maxpacket: 8 [ 1289.159072][T12010] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1289.168472][T12010] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1289.181171][T12010] usb 6-1: config 0 descriptor?? [ 1289.222132][T12010] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1290.527084][T12010] gspca_stk1135: reg_w 0xd err -71 [ 1290.533419][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1290.545863][T12010] gspca_stk1135: Sensor write failed [ 1290.554512][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1290.564076][T12010] gspca_stk1135: Sensor write failed [ 1290.572482][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1290.582394][T12010] gspca_stk1135: Sensor read failed [ 1290.590855][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1290.600524][T12010] gspca_stk1135: Sensor read failed [ 1290.605710][T12010] gspca_stk1135: Detected sensor type unknown (0x0) [ 1290.618198][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1290.624631][T12010] gspca_stk1135: Sensor read failed [ 1290.636483][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1290.646169][T12010] gspca_stk1135: Sensor read failed [ 1290.654747][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1290.662950][T12010] gspca_stk1135: Sensor write failed [ 1290.669983][T12010] gspca_stk1135: serial bus timeout: status=0x00 [ 1290.676299][T12010] gspca_stk1135: Sensor write failed [ 1290.681627][T12010] stk1135: probe of 6-1:0.0 failed with error -71 [ 1290.689151][T12010] usb 6-1: USB disconnect, device number 127 17:44:45 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000200001,disabl']) 17:44:45 executing program 3: pipe2(&(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(r0, 0x0, 0x0) 17:44:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x0, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), 0x10) 17:44:45 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:45 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) dup2(r2, r0) 17:44:45 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x101000) [ 1291.069466][T19742] validate_nla: 2 callbacks suppressed [ 1291.069478][T19742] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1291.095224][T19743] __ntfs_warning: 9 callbacks suppressed [ 1291.095236][T19743] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 17:44:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r0) [ 1291.150690][T19743] ntfs: (device loop1): parse_options(): Unrecognized mount option disabl. [ 1291.166299][T19754] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:45 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:44:45 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='utf8,errors=remount-ro,disable_sparse=yes,mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000200001,disabl']) [ 1291.207326][ T35] audit: type=1804 audit(1612460685.583:890): pid=19762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1373/bus" dev="sda1" ino=14329 res=1 errno=0 17:44:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x0, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) [ 1291.334969][T19772] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1291.340387][T19773] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1291.370026][T19772] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:45 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) dup2(r2, r0) [ 1291.378752][ T1961] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 1291.427118][T19773] ntfs: (device loop1): parse_options(): Unrecognized mount option disabl. 17:44:45 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df737061727365"]) 17:44:45 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) dup2(r2, r0) [ 1291.577587][T19787] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1291.607739][T19787] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1291.627347][ T1961] usb 6-1: Using ep0 maxpacket: 8 [ 1291.767435][ T1961] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1291.778817][ T1961] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1291.787721][ T1961] usb 6-1: config 0 descriptor?? [ 1291.838971][ T1961] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1293.156899][ T1961] gspca_stk1135: reg_w 0xd err -71 [ 1293.163269][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1293.176648][ T1961] gspca_stk1135: Sensor write failed [ 1293.185461][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1293.195579][ T1961] gspca_stk1135: Sensor write failed [ 1293.203750][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1293.213855][ T1961] gspca_stk1135: Sensor read failed [ 1293.222246][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1293.231712][ T1961] gspca_stk1135: Sensor read failed [ 1293.240156][ T1961] gspca_stk1135: Detected sensor type unknown (0x0) [ 1293.246758][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1293.259367][ T1961] gspca_stk1135: Sensor read failed [ 1293.264572][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1293.277285][ T1961] gspca_stk1135: Sensor read failed [ 1293.282587][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1293.288966][ T1961] gspca_stk1135: Sensor write failed [ 1293.295014][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1293.303019][ T1961] gspca_stk1135: Sensor write failed [ 1293.308361][ T1961] stk1135: probe of 6-1:0.0 failed with error -71 [ 1293.316062][ T1961] usb 6-1: USB disconnect, device number 2 17:44:48 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000180)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x0, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:48 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) dup2(r2, r0) 17:44:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) dup2(r2, r0) 17:44:48 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df737061727365"]) 17:44:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) [ 1293.681131][T19819] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1293.691710][T19816] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1293.694795][T19819] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1293.749040][T19816] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. 17:44:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) dup2(r2, r0) 17:44:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:48 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) r2 = socket(0x200000000000011, 0x4000000000080002, 0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) dup2(r2, r0) [ 1293.786885][ T35] audit: type=1804 audit(1612460688.164:891): pid=19829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1374/bus" dev="sda1" ino=14329 res=1 errno=0 [ 1293.871020][T19835] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:48 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df737061727365"]) [ 1293.941473][T19835] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1294.007093][ T7327] usb 6-1: new high-speed USB device number 3 using dummy_hcd 17:44:48 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c"]) 17:44:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1294.158427][T19852] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1294.175367][T19852] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1294.287811][ T7327] usb 6-1: Using ep0 maxpacket: 8 [ 1294.426758][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1294.437040][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1294.445690][ T7327] usb 6-1: config 0 descriptor?? [ 1294.480939][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1295.757602][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1295.763743][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1295.773768][ T7327] gspca_stk1135: Sensor write failed [ 1295.780386][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1295.789422][ T7327] gspca_stk1135: Sensor write failed [ 1295.794704][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1295.801038][ T7327] gspca_stk1135: Sensor read failed [ 1295.806377][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1295.816074][ T7327] gspca_stk1135: Sensor read failed [ 1295.821642][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1295.828284][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1295.834644][ T7327] gspca_stk1135: Sensor read failed [ 1295.839946][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1295.847204][ T7327] gspca_stk1135: Sensor read failed [ 1295.853136][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1295.860355][ T7327] gspca_stk1135: Sensor write failed [ 1295.865657][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1295.872032][ T7327] gspca_stk1135: Sensor write failed [ 1295.878209][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1295.885752][ T7327] usb 6-1: USB disconnect, device number 3 17:44:50 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 17:44:50 executing program 3: preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) 17:44:50 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}], 0x1, 0x301f2f5a, 0x0) 17:44:50 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c"]) 17:44:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) [ 1296.259126][T19874] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1296.293286][T19874] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:44:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{}]}) 17:44:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) syz_open_pts(r0, 0x0) unlink(0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x884000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x7, 0x12, r2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1296.303752][T19882] __ntfs_warning: 5 callbacks suppressed [ 1296.303764][T19882] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1296.335480][T19882] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1296.345061][T19882] ntfs: (device loop1): parse_options(): Unrecognized mount option . 17:44:50 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c"]) [ 1296.405898][ T35] audit: type=1804 audit(1612460690.774:892): pid=19896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1375/bus" dev="sda1" ino=14317 res=1 errno=0 [ 1296.438931][T19897] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 17:44:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1296.471900][T19897] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.504819][T19904] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1296.514296][T19905] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1296.536300][T19904] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1296.546448][T19905] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1296.556029][T19905] ntfs: (device loop1): parse_options(): Unrecognized mount option . 17:44:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netstat\x00') read$alg(r0, 0x0, 0x0) 17:44:50 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000000018105e04db0700000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000200)={@local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x30, 0x3a, 0x0, @local={0xfe, 0x80, [0x5, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xd, 0x2, 0x0, 0xff]}, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "7fb4a8", 0x0, 0x0, 0x0, @loopback, @dev}}}}}}}, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x4e, 0x84, 0x4e, 0x0, 0x458, 0x707f, 0x3653, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xef, 0x7e, 0xe6}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\"\"\x00\x00\x00'], 0x0}, 0x0) [ 1296.586598][ T1961] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 1296.826562][ T1961] usb 6-1: Using ep0 maxpacket: 8 [ 1296.946710][ T1961] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1296.955789][ T9316] usb 4-1: new high-speed USB device number 86 using dummy_hcd [ 1296.963657][ T1961] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1296.979531][ T1961] usb 6-1: config 0 descriptor?? [ 1297.028632][ T1961] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1297.196551][ T9316] usb 4-1: Using ep0 maxpacket: 16 [ 1297.316593][ T9316] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1297.327734][ T9316] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1297.337572][ T9316] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 1297.351629][ T9316] usb 4-1: New USB device found, idVendor=045e, idProduct=07db, bcdDevice= 0.00 [ 1297.360762][ T9316] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1297.369531][ T9316] usb 4-1: config 0 descriptor?? [ 1297.827825][T19924] udc-core: couldn't find an available UDC or it's busy [ 1297.834785][T19924] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 1297.847245][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x0 [ 1297.854853][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x1 [ 1297.866040][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x0 [ 1297.873759][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x0 [ 1297.881447][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x0 [ 1297.891777][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x0 [ 1297.899532][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x0 [ 1297.907307][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x0 [ 1297.915014][ T9316] hid-generic 0003:045E:07DB.0018: unknown main item tag 0x0 [ 1297.924705][ T9316] hid-generic 0003:045E:07DB.0018: unbalanced delimiter at end of report description [ 1297.934580][ T9316] hid-generic: probe of 0003:045E:07DB.0018 failed with error -22 [ 1298.067940][ T7327] usb 4-1: USB disconnect, device number 86 [ 1298.576430][ T1961] gspca_stk1135: reg_w 0xf err -71 [ 1298.582665][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1298.590926][ T1961] gspca_stk1135: Sensor write failed [ 1298.598142][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1298.605802][ T1961] gspca_stk1135: Sensor write failed [ 1298.611506][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1298.620390][ T1961] gspca_stk1135: Sensor read failed [ 1298.627359][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1298.633774][ T1961] gspca_stk1135: Sensor read failed [ 1298.640713][ T1961] gspca_stk1135: Detected sensor type unknown (0x0) [ 1298.649145][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1298.655456][ T1961] gspca_stk1135: Sensor read failed [ 1298.662341][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1298.670990][ T1961] gspca_stk1135: Sensor read failed [ 1298.676594][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1298.682955][ T1961] gspca_stk1135: Sensor write failed [ 1298.690140][ T1961] gspca_stk1135: serial bus timeout: status=0x00 [ 1298.696637][ T1961] gspca_stk1135: Sensor write failed [ 1298.701948][ T1961] stk1135: probe of 6-1:0.0 failed with error -71 [ 1298.709315][ T1961] usb 6-1: USB disconnect, device number 4 [ 1298.866396][ T9316] usb 4-1: new high-speed USB device number 87 using dummy_hcd 17:44:53 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 17:44:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 17:44:53 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c7574"]) 17:44:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) 17:44:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) [ 1299.083821][T19969] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1299.101406][T19967] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1299.120214][T19969] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. 17:44:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) syz_open_pts(r0, 0x0) unlink(0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000ac0)) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x884000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x7, 0x12, r2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 17:44:53 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c7574"]) [ 1299.136473][ T9316] usb 4-1: Using ep0 maxpacket: 16 [ 1299.155515][T19969] ntfs: (device loop1): parse_options(): Unrecognized mount option ut. 17:44:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) [ 1299.194500][T19985] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1299.203706][T19985] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.2'. 17:44:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) syz_open_pts(r0, 0x0) unlink(0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000ac0)) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x884000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x7, 0x12, r2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e28000026000511d25a80648c63940d0424fc60100016400a0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1299.262242][T19993] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1299.272185][ T9316] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1299.288386][ T9316] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 17:44:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, 0x0, 0x0) [ 1299.314750][ T9316] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 17:44:53 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c7574"]) [ 1299.372218][T19999] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1299.376338][ T7327] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 1299.384356][ T9316] usb 4-1: New USB device found, idVendor=045e, idProduct=07db, bcdDevice= 0.00 [ 1299.397278][T20001] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1299.438772][T19999] netlink: 10238 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1299.465884][ T9316] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1299.480748][ T9316] usb 4-1: config 0 descriptor?? [ 1299.626325][ T7327] usb 6-1: Using ep0 maxpacket: 8 17:44:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, 0x0, 0x0) [ 1299.705210][T20014] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1299.746703][ T7327] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1299.756011][ T7327] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1299.776364][ T9316] usbhid 4-1:0.0: can't add hid device: -71 [ 1299.787846][ T7327] usb 6-1: config 0 descriptor?? [ 1299.788567][ T9316] usbhid: probe of 4-1:0.0 failed with error -71 [ 1299.831358][ T9316] usb 4-1: USB disconnect, device number 87 [ 1299.849565][ T7327] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1301.156255][ T7327] gspca_stk1135: reg_w 0xd err -71 [ 1301.162604][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1301.172407][ T7327] gspca_stk1135: Sensor write failed [ 1301.180004][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1301.186641][ T7327] gspca_stk1135: Sensor write failed [ 1301.192440][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1301.200294][ T7327] gspca_stk1135: Sensor read failed [ 1301.205655][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1301.213926][ T7327] gspca_stk1135: Sensor read failed [ 1301.221132][ T7327] gspca_stk1135: Detected sensor type unknown (0x0) [ 1301.228863][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1301.235173][ T7327] gspca_stk1135: Sensor read failed [ 1301.244252][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1301.252063][ T7327] gspca_stk1135: Sensor read failed [ 1301.257521][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1301.264010][ T7327] gspca_stk1135: Sensor write failed [ 1301.270082][ T7327] gspca_stk1135: serial bus timeout: status=0x00 [ 1301.277245][ T7327] gspca_stk1135: Sensor write failed [ 1301.282553][ T7327] stk1135: probe of 6-1:0.0 failed with error -71 [ 1301.292122][ T7327] usb 6-1: USB disconnect, device number 5 17:44:56 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 17:44:56 executing program 2: r0 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)) 17:44:56 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c757466"]) 17:44:56 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b6872abb"}, 0x0, 0x0, @fd}) 17:44:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, 0x0, 0x0) 17:44:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:44:56 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "391364", 0x50, 0x6, 0x0, @empty, @mcast2, {[@hopopts={0x0, 0x8, [], [@generic={0x0, 0x3f, "973f9da2dee64b6c8693f032b609e1953f072f0754d5f6fb9e3fe6de45e803be0fd1c0b436abf9a653af291d9ff1876acc156cea7c71b7c3356bfc16aa44f5"}]}]}}}}}, 0x0) [ 1301.689521][T20039] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1301.716582][T20041] __ntfs_warning: 7 callbacks suppressed 17:44:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, 0x0) 17:44:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140), 0x0) [ 1301.716592][T20041] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1301.770296][T20055] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1301.804830][ T35] audit: type=1804 audit(1612460696.174:894): pid=20062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1377/bus" dev="sda1" ino=14329 res=1 errno=0 17:44:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5460, 0x0) 17:44:56 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000004f80)=[{{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000000b00)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000000)={0x1, 0x8, 0x400}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fb5305cfee998b27000000000e218dd253adff8d2cee9cfecfd2e4bb1ea7b0de61cdd09601c7ae210ca1d5fbe72fb92be619709d05d921224cb390e1aaf672572d5608b6b55d9c614d6b0ac86aa11f53f843482e24a799435eebd42fc9836647c38ae44c908ce944463cccdd23a79fa7abfd174569bed416e65bfd0f"], 0x53, 0x50ddbc2805740467) 17:44:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140), 0x0) [ 1301.941056][T20041] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1301.976249][T10422] usb 6-1: new high-speed USB device number 6 using dummy_hcd [ 1302.010896][T20041] ntfs: (device loop1): parse_options(): Unrecognized mount option utf. [ 1302.056696][T20079] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1302.276146][T10422] usb 6-1: Using ep0 maxpacket: 8 [ 1302.416384][T10422] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1302.425562][T10422] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1302.445129][T10422] usb 6-1: config 0 descriptor?? [ 1302.510162][T10422] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1303.796270][T10422] gspca_stk1135: reg_w 0xd err -71 [ 1303.802467][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1303.815751][T10422] gspca_stk1135: Sensor write failed [ 1303.824662][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1303.834781][T10422] gspca_stk1135: Sensor write failed [ 1303.843443][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1303.853033][T10422] gspca_stk1135: Sensor read failed [ 1303.861479][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1303.871466][T10422] gspca_stk1135: Sensor read failed [ 1303.880029][T10422] gspca_stk1135: Detected sensor type unknown (0x0) [ 1303.890076][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1303.897903][T10422] gspca_stk1135: Sensor read failed [ 1303.903276][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1303.909623][T10422] gspca_stk1135: Sensor read failed [ 1303.914863][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1303.921188][T10422] gspca_stk1135: Sensor write failed [ 1303.927130][T10422] gspca_stk1135: serial bus timeout: status=0x00 [ 1303.934523][T10422] gspca_stk1135: Sensor write failed [ 1303.939873][T10422] stk1135: probe of 6-1:0.0 failed with error -71 [ 1303.947545][T10422] usb 6-1: USB disconnect, device number 6 17:44:58 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x67, 0x9b, 0x5c, 0x8, 0x174f, 0x6a31, 0x6fca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd3, 0xe4, 0x31}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) 17:44:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x84}, 0x1c) 17:44:58 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000004f80)=[{{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000000b00)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000000)={0x1, 0x8, 0x400}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fb5305cfee998b27000000000e218dd253adff8d2cee9cfecfd2e4bb1ea7b0de61cdd09601c7ae210ca1d5fbe72fb92be619709d05d921224cb390e1aaf672572d5608b6b55d9c614d6b0ac86aa11f53f843482e24a799435eebd42fc9836647c38ae44c908ce944463cccdd23a79fa7abfd174569bed416e65bfd0f"], 0x53, 0x50ddbc2805740467) 17:44:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140), 0x0) 17:44:58 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c757466"]) 17:44:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648e"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) [ 1304.337419][T20107] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1304.347602][T20102] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1304.359952][T20107] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. 17:44:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004f80)=[{{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000000b00)=""/8, 0x8}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000000)={0x1, 0x8, 0x400}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fb5305cfee998b27000000000e218dd253adff8d2cee9cfecfd2e4bb1ea7b0de61cdd09601c7ae210ca1d5fbe72fb92be619709d05d921224cb390e1aaf672572d5608b6b55d9c614d6b0ac86aa11f53f843482e24a799435eebd42fc9836647c38ae44c908ce944463cccdd23a79fa7abfd174569bed416e65bfd0f"], 0x53, 0x50ddbc2805740467) 17:44:58 executing program 3: fanotify_mark(0xffffffffffffffff, 0x78, 0x0, 0xffffffffffffffff, 0x0) [ 1304.386967][T20107] ntfs: (device loop1): parse_options(): Unrecognized mount option utf. 17:44:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{0x0}], 0x1) 17:44:58 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80) 17:44:58 executing program 1: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="757466382c6572726f72733d72656d6f756e742d726f2c64697361626c655f7370617273653d7965732c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736b3d30303030303030303030303030303030303230303030312c64697361626c65df7370617273653d6e6f2c757466"]) [ 1304.438833][ T35] audit: type=1804 audit(1612460698.814:895): pid=20118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1378/bus" dev="sda1" ino=14320 res=1 errno=0 17:44:58 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 1304.525701][T20125] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1304.588742][T20128] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1304.605946][T10432] usb 6-1: new high-speed USB device number 7 using dummy_hcd [ 1304.645565][T20128] ntfs: (device loop1): parse_options(): Unrecognized mount option disableßsparse. [ 1304.855940][T10432] usb 6-1: Using ep0 maxpacket: 8 [ 1304.985947][T10432] usb 6-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=6f.ca [ 1305.000948][T10432] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1305.018319][T10432] usb 6-1: config 0 descriptor?? [ 1305.059110][T10432] gspca_main: stk1135-2.14.0 probing 174f:6a31 [ 1306.366920][T10432] gspca_stk1135: reg_w 0xd err -71 [ 1306.373060][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1306.385817][T10432] gspca_stk1135: Sensor write failed [ 1306.391161][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1306.404174][T10432] gspca_stk1135: Sensor write failed [ 1306.413081][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1306.421231][T10432] gspca_stk1135: Sensor read failed [ 1306.428093][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1306.434430][T10432] gspca_stk1135: Sensor read failed [ 1306.439703][T10432] gspca_stk1135: Detected sensor type unknown (0x0) [ 1306.447416][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1306.453729][T10432] gspca_stk1135: Sensor read failed [ 1306.458993][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1306.466828][T10432] gspca_stk1135: Sensor read failed [ 1306.472158][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1306.478830][T10432] gspca_stk1135: Sensor write failed [ 1306.484113][T10432] gspca_stk1135: serial bus timeout: status=0x00 [ 1306.490594][T10432] gspca_stk1135: Sensor write failed [ 1306.496509][T10432] stk1135: probe of 6-1:0.0 failed with error -71 [ 1306.505943][T10432] usb 6-1: USB disconnect, device number 7 17:45:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{0x0}], 0x1) 17:45:01 executing program 2: r0 = socket(0x18, 0x0, 0x1) accept4$unix(r0, 0x0, 0x0, 0x0) 17:45:01 executing program 3: add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) 17:45:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8949, &(0x7f0000000200)={'gre0\x00', 0x0}) 17:45:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648e"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000004b40)={'filter\x00', 0x7, 0x4, 0x3d8, 0x0, 0x10c, 0x0, 0x2f8, 0x2f8, 0x2f8, 0x4, 0x0, {[{{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local, @dev, @multicast2}}}, {{@uncond, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @mac=@broadcast, @dev, @broadcast}}}, {{@uncond, 0xbc, 0xe0}, @unspec=@NFQUEUE0={0x24, 'NFQUEUE\x00'}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x424) 17:45:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x50) 17:45:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x3d0, 0x1e4, 0x1e4, 0x1e4, 0x2f0, 0x2f0, 0x2f0, 0x4, 0x0, {[{{@arp={@rand_addr, @private, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'gre0\x00', 'veth0_virt_wifi\x00'}, 0xbc, 0xe0}, @unspec=@AUDIT={0x24, 'AUDIT\x00'}}, {{@arp={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac=@dev}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'tunl0\x00', 'ipvlan0\x00'}, 0xbc, 0x104}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'caif0\x00', 'veth0_to_team\x00'}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="32ccb39f4dd4", @empty, @multicast2, @loopback}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x41c) 17:45:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x1}, 0x24}}, 0x0) 17:45:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{0x0}], 0x1) [ 1306.902718][T20173] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1306.914129][ T35] kauditd_printk_skb: 1 callbacks suppressed [ 1306.914140][ T35] audit: type=1326 audit(1612460701.285:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20163 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 17:45:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x1, 0x0, &(0x7f0000003a40)) 17:45:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000000)={'team_slave_1\x00', @ifru_addrs=@phonet}) 17:45:01 executing program 1: openat$null(0xffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x6b3002, 0x0) [ 1306.997420][T20184] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1) [ 1307.063879][ T35] audit: type=1804 audit(1612460701.385:897): pid=20186 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1379/bus" dev="sda1" ino=14328 res=1 errno=0 [ 1307.148243][T20195] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:02 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000005ac0)) 17:45:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)=0xffffff73) [ 1307.723902][ T35] audit: type=1326 audit(1612460702.095:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20163 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465b09 code=0x0 17:45:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648e"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4}]}]}, 0x28}}, 0x0) 17:45:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000000)={'gre0\x00', @ifru_addrs=@phonet}) 17:45:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1) 17:45:02 executing program 1: timer_create(0x3, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x77359400}}, 0x0) 17:45:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x41c, 0xa4, 0xa4, 0xffffffff, 0x2e4, 0x2e4, 0x388, 0x388, 0xffffffff, 0x388, 0x388, 0x5, 0x0, {[{{@ip={@broadcast, @rand_addr, 0x0, 0x0, 'macsec0\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xa4}, @DNAT0={0x34, 'DNAT\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @port, @icmp_id}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'bridge_slave_0\x00', 'gretap0\x00'}, 0x0, 0xb0, 0xe4, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [], 0x0, 0x168d3773d652043f}}}]}, @NETMAP={0x34, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @multicast1, @port, @gre_key}}}}, {{@ip={@dev, @private, 0x0, 0x0, 'gretap0\x00', 'erspan0\x00'}, 0x0, 0x128, 0x15c, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], @ipv6=@local, [], @ipv4=@local, [], @ipv4=@local}}}]}, @SNAT0={0x34, 'SNAT\x00', 0x0, {0x1, {0x0, @loopback, @broadcast, @port, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0xa4}, @SNAT0={0x34, 'SNAT\x00', 0x0, {0x1, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x478) 17:45:02 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78}, 0x78) write$FUSE_WRITE(r0, &(0x7f0000002380)={0x18}, 0x18) 17:45:02 executing program 3: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000b00)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000b40)={0x0, 0x0, 0xfffff800, 0x0, 0x0, "f4e5dcad2f731d9e8090e6c3b162be384cfb2d", 0x0, 0x10001}) [ 1307.854640][T20217] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1307.888885][T20223] bridge0: port 1(bridge_slave_0) entered blocking state [ 1307.897302][T20223] bridge0: port 1(bridge_slave_0) entered forwarding state 17:45:02 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 17:45:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1) 17:45:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8910, 0x0) 17:45:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f00000000c0)=""/9) [ 1307.973697][T20233] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1308.048167][ T35] audit: type=1804 audit(1612460702.425:899): pid=20243 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1380/bus" dev="sda1" ino=14246 res=1 errno=0 17:45:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c37580"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:03 executing program 3: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000b00)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000b40)={0x0, 0x0, 0xfffff800, 0x0, 0x0, "f4e5dcad2f731d9e8090e6c3b162be384cfb2d", 0x0, 0x10001}) 17:45:03 executing program 5: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000b00)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000b40)={0x0, 0x0, 0xfffff800, 0x0, 0x0, "f4e5dcad2f731d9e8090e6c3b162be384cfb2d", 0x0, 0x10001}) 17:45:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025", 0x1d}], 0x1) 17:45:03 executing program 2: timer_create(0x2, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x0, r0+60000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x77359400}}, 0x0) 17:45:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001300)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) 17:45:03 executing program 1: socketpair(0x1, 0x0, 0x6e, 0x0) 17:45:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025", 0x1d}], 0x1) 17:45:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x4, 0x424, 0xffffffff, 0x294, 0xc8, 0xc8, 0xffffffff, 0xffffffff, 0x35c, 0x35c, 0x35c, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast2, @local, [], [], '\x00', 'erspan0\x00'}, 0x0, 0xa4, 0xc8}, @REJECT={0x24, 'REJECT\x00'}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, [], [], 'tunl0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0x1cc}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:user_cron_spool_t:s0\x00'}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x480) 17:45:03 executing program 5: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000b00)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000b40)={0x0, 0x0, 0xfffff800, 0x0, 0x0, "f4e5dcad2f731d9e8090e6c3b162be384cfb2d", 0x0, 0x10001}) [ 1308.874450][T20263] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:03 executing program 3: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000b00)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000b40)={0x0, 0x0, 0xfffff800, 0x0, 0x0, "f4e5dcad2f731d9e8090e6c3b162be384cfb2d", 0x0, 0x10001}) 17:45:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_getlink={0x40, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_MAP={0x20}]}, 0x40}}, 0x0) [ 1308.976795][T20273] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1309.022227][ T35] audit: type=1804 audit(1612460703.395:900): pid=20282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1381/bus" dev="sda1" ino=14320 res=1 errno=0 17:45:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c37580"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e, 0x1}, 0x24}}, 0x0) 17:45:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025", 0x1d}], 0x1) 17:45:04 executing program 1: r0 = openat$fuse(0xffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x5, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) io_getevents(r1, 0x1, 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000200)={0x0, r2+10000000}) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x4c}]) 17:45:04 executing program 5: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000b00)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000b40)={0x0, 0x0, 0xfffff800, 0x0, 0x0, "f4e5dcad2f731d9e8090e6c3b162be384cfb2d", 0x0, 0x10001}) 17:45:04 executing program 3: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000b00)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000b40)={0x0, 0x0, 0xfffff800, 0x0, 0x0, "f4e5dcad2f731d9e8090e6c3b162be384cfb2d", 0x0, 0x10001}) 17:45:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x12dc, 0xffffffff, 0x1120, 0x11ec, 0x0, 0xffffffff, 0xffffffff, 0x12e4, 0x12e4, 0x12e4, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'tunl0\x00', 'ip_vti0\x00'}, 0x0, 0x10c4, 0x1120, 0x0, {}, [@common=@icmp={{0x24, 'icmp\x00'}, {0x0, "d827"}}, @common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0x94}, @common=@inet=@SYNPROXY={0x24, 'SYNPROXY\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'batadv_slave_0\x00', 'veth1_to_bond\x00', {}, {}, 0x0, 0x4}, 0x0, 0x70, 0x94}, @common=@unspec=@AUDIT={0x24, 'AUDIT\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x1338) 17:45:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17", 0x2b}], 0x1) [ 1309.865969][T20300] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:04 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='maps\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 17:45:04 executing program 5: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r0) 17:45:04 executing program 3: r0 = openat$fuse(0xffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) io_submit(r1, 0x2, &(0x7f0000000340)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) 17:45:04 executing program 5: openat$fuse(0xffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000040)) [ 1309.978089][T20317] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1310.016392][ T35] audit: type=1804 audit(1612460704.395:901): pid=20324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1382/bus" dev="sda1" ino=14314 res=1 errno=0 17:45:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c37580"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'lo\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 17:45:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x6, 0x1, 0x9d}, 0xc) 17:45:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17", 0x2b}], 0x1) 17:45:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='maps\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 17:45:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:45:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000001380)) 17:45:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='maps\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) [ 1310.877381][T20341] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:05 executing program 1: r0 = openat$fuse(0xffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x5, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f00000001c0)) io_getevents(r1, 0x1, 0x1, &(0x7f0000000100)=[{}], 0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x4c}]) 17:45:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17", 0x2b}], 0x1) 17:45:05 executing program 3: r0 = openat$null(0xffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x280000, 0x0) connect$unix(r0, 0x0, 0x0) 17:45:05 executing program 3: pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) [ 1311.085999][ T35] audit: type=1804 audit(1612460705.465:902): pid=20367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1383/bus" dev="sda1" ino=14217 res=1 errno=0 17:45:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab172"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e06060400", 0x32}], 0x1) 17:45:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='maps\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 17:45:06 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_rm_watch(r0, 0x0) 17:45:06 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) syncfs(r0) 17:45:06 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x2) epoll_pwait(r1, &(0x7f0000000180)=[{}], 0x1, 0xff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 17:45:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e06060400", 0x32}], 0x1) 17:45:06 executing program 3: timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000000)) 17:45:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000600)={'ah\x00'}, &(0x7f0000000640)=0x1e) 17:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000100)) 17:45:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="380000001a0001f1"], 0x38}}, 0x0) 17:45:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e06060400", 0x32}], 0x1) [ 1311.965808][T20396] validate_nla: 2 callbacks suppressed [ 1311.965818][T20396] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1312.061155][T20409] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1312.075140][ T35] audit: type=1804 audit(1612460706.445:903): pid=20410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1384/bus" dev="sda1" ino=14325 res=1 errno=0 17:45:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000600)={'ah\x00'}, &(0x7f0000000640)=0x1e) 17:45:07 executing program 5: openat$uinput(0xffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:45:07 executing program 1: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 17:45:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000", 0x36}], 0x1) 17:45:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab172"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="380000001a0001f1"], 0x38}}, 0x0) 17:45:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x1}}}, 0x24}}, 0x0) 17:45:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000600)={'ah\x00'}, &(0x7f0000000640)=0x1e) [ 1312.880539][T20427] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000001540)={@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 17:45:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000", 0x36}], 0x1) 17:45:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x84) 17:45:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @vsock={0x28, 0x0, 0x0, @hyper}, @nl, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="e4db915ae49e"}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='syz_tun\x00'}) 17:45:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000", 0x36}], 0x1) 17:45:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000600)={'ah\x00'}, &(0x7f0000000640)=0x1e) [ 1312.968377][T20443] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="380000001a0001f1"], 0x38}}, 0x0) 17:45:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002023, 0x0) [ 1313.045758][ T35] audit: type=1804 audit(1612460707.425:904): pid=20454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1385/bus" dev="sda1" ino=14246 res=1 errno=0 [ 1313.063247][T20457] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab172"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:08 executing program 1: io_setup(0x3, &(0x7f0000000000)=0x0) io_setup(0x5, &(0x7f0000000080)) io_destroy(r0) 17:45:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e06060400200000000000", 0x38}], 0x1) 17:45:08 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78}, 0xffffffffffffff3a) write$FUSE_WRITE(r0, &(0x7f0000002380)={0x18}, 0x18) 17:45:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0xa, 0x0, &(0x7f0000000100)) 17:45:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="380000001a0001f1"], 0x38}}, 0x0) 17:45:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 17:45:08 executing program 5: r0 = openat$fuse(0xffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 17:45:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e06060400200000000000", 0x38}], 0x1) [ 1313.875007][T20482] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:08 executing program 2: syz_emit_ethernet(0x8a, &(0x7f0000000140)={@multicast, @broadcast, @void, {@ipv4={0x800, @tipc={{0x15, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @broadcast, @empty, {[@lsrr={0x83, 0xb, 0x0, [@multicast1, @multicast1]}, @rr={0x7, 0x2b, 0x0, [@broadcast, @private, @rand_addr, @rand_addr, @local, @multicast2, @broadcast, @loopback, @rand_addr, @local]}, @lsrr={0x83, 0x7, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}]}]}}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}, 0x0) 17:45:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x1, 0x1, [@local]}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e06060400200000000000", 0x38}], 0x1) [ 1313.939003][T20495] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f00000001c0)={0x51, 0x0, 0x0, {}, {}, @period={0x5d, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) [ 1314.032963][ T35] audit: type=1804 audit(1612460708.405:905): pid=20506 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1386/bus" dev="sda1" ino=14219 res=1 errno=0 [ 1314.066973][T20505] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 17:45:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:09 executing program 2: openat$null(0xffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) waitid(0x2, 0x0, &(0x7f0000000080), 0x7, 0x0) 17:45:09 executing program 5: socketpair(0x10, 0x2, 0x3, 0x0) 17:45:09 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(r0) write$P9_RLERROR(r1, 0x0, 0x0) 17:45:09 executing program 3: io_setup(0x3, &(0x7f0000000000)=0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 17:45:09 executing program 0: r0 = openat$null(0xffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 17:45:09 executing program 2: perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:45:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000580)={0x0, 0x0, 0x0}) 17:45:09 executing program 5: io_setup(0x8001, &(0x7f0000000100)=0x0) io_destroy(r0) 17:45:09 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40101, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) 17:45:09 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40101, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 17:45:09 executing program 0: pipe(&(0x7f00000003c0)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 1314.983041][ T35] audit: type=1804 audit(1612460709.355:906): pid=20548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1387/bus" dev="sda1" ino=14296 res=1 errno=0 17:45:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:10 executing program 1: r0 = semget(0x2, 0x0, 0x0) semctl$GETPID(r0, 0x0, 0xb, 0x0) 17:45:10 executing program 5: r0 = epoll_create1(0x0) r1 = eventfd(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 17:45:10 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$tcp_congestion(r0, 0xffffffffffffffff, 0x0) 17:45:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f000000", 0x17}, {&(0x7f0000013900)}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = signalfd(0xffffffffffffffff, 0x0, 0x0) read$char_usb(r4, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000004c0)=0x100, 0x7ff) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) unlinkat(r3, &(0x7f0000000080)='./file0/file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r5, r3, 0x0, 0xa198) sendfile(r2, r1, 0x0, 0xa198) 17:45:10 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 17:45:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)="004e535230330100"/30, 0x1e, 0x8800}, {&(0x7f0000010200)}, {&(0x7f0000010300)="010003000b0001005c59f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/122, 0x7a, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a3e2835002a4c696e7578205544464653000000000000000000000004050000", 0xe0, 0x180c0}, {&(0x7f0000010500)="0000000000000000010000", 0xb, 0x181e0}, {&(0x7f0000010600)="06000300e2000100800ee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x5d, 0x18400}, {&(0x7f0000010700)="000000000000000000000000000000000000000900040000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000400001000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405000000000000", 0x70, 0x184c0}, {&(0x7f0000010800)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e010204050000000001000000100002003802000070000000f0070000000000", 0x53, 0x185a0}, {&(0x7f0000010900)="050003002e0001003a98f001620000000500000001000000002b4e53523033000000000000000000000000000000000000000000000000000000000000000000000400000000", 0x46, 0x18800}, {&(0x7f0000010a00)="0000000000000000000000000000000000000000000000000400000010050000d0020000002a4c696e75782055444646530000000000000000000000040500", 0x3f, 0x188a0}, {&(0x7f0000010b00)="0700030005000100f275300063000000060000000500000000e4000027000000002c00007500000000c0010090000000003c000001", 0x35, 0x18c00}, {&(0x7f0000010c00)="04000300f60001003168f00164", 0xd}, {0x0}, {&(0x7f0000011400)="020003003800010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}, {&(0x7f0000011600)="00010300380001001e14f001100000007810e4070913142c1a3e28350300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x7c, 0x148000}, {&(0x7f0000011700)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900040000300000000000000000000000002a4f5354412055444620436f6d706c69616e7400000000010200000000000000000000000000000000000000000000000400002000"/256, 0x100, 0x1480e0}, {&(0x7f0000011800)="0a0103008b000100c76034012000000000000000040000000100000d00000000000003000000000000000000a57c000001000000000000006c000000000000006c0000000000000000000000000000007810e4070913142c1a3e28357810e4070913142c1a3e28357810e4070913142c1a3e28357810e4070913142c1a3e283501000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c", 0xab, 0x14c000}, {&(0x7f0000011a00)="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", 0x1e0, 0x150000}, {&(0x7f0000011c00)="0a010300c400010080bb48013100000000000000040000000100000400000000000003000000000000000000a57c000001000000000000008000000000000000800000000000000000000000000000000010e4070913122c1b08224b0010e4070913122c1b08224b0010e4070913122c1b08224b0010e4070913122c1b08224b0100"/165, 0xa5}, {&(0x7f0000012d00)}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000013b00)) 17:45:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 17:45:10 executing program 3: r0 = epoll_create1(0x0) r1 = dup(r0) write$P9_RGETATTR(r1, 0x0, 0x0) [ 1315.856961][T20568] loop2: detected capacity change from 4096 to 0 [ 1315.884493][T20568] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:45:10 executing program 0: r0 = epoll_create1(0x0) r1 = dup(r0) write$FUSE_GETXATTR(r1, 0x0, 0x0) [ 1315.898200][ T35] audit: type=1800 audit(1612460710.275:907): pid=20568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=17 res=0 errno=0 [ 1315.956745][ T35] audit: type=1804 audit(1612460710.315:908): pid=20568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1439/file0/file0" dev="loop2" ino=17 res=1 errno=0 [ 1315.966041][T20579] loop5: detected capacity change from 5376 to 0 [ 1315.993383][T20579] UDF-fs: warning (device loop5): udf_load_vrs: No anchor found 17:45:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x0, 0x0, 0x98, 0xffffffff, 0xffffffff, 0x1c8, 0x1c8, 0x1c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@broadcast, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'wg1\x00', {0xff}, {0xff}, 0x11, 0x1, 0x1}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@broadcast, @loopback, 0xffffffff, 0x0, 'veth0_to_team\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) [ 1316.002359][T20579] UDF-fs: Scanning with blocksize 512 failed [ 1316.004081][ T35] audit: type=1804 audit(1612460710.315:909): pid=20568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1439/file0/file0" dev="loop2" ino=17 res=1 errno=0 [ 1316.095919][ T35] audit: type=1804 audit(1612460710.325:910): pid=20568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1439/file0/file0" dev="loop2" ino=17 res=1 errno=0 17:45:10 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000), 0x10) [ 1316.157374][T20579] UDF-fs: warning (device loop5): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount [ 1316.168923][ T35] audit: type=1804 audit(1612460710.325:911): pid=20568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir713655871/syzkaller.z7lIe4/1439/file0/file0" dev="loop2" ino=17 res=1 errno=0 [ 1316.192606][T20599] x_tables: duplicate underflow at hook 2 [ 1316.194508][ T35] audit: type=1804 audit(1612460710.415:912): pid=20590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir871425549/syzkaller.WJtIRj/1388/bus" dev="sda1" ino=14329 res=1 errno=0 17:45:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() lgetxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="b5878c967c2376b34f46304efef8d82ca463d317886decf98e00006d6ff350abbf01eb23088434ebb34000000069189627205be4a9165831650d6cc3a8ffd48dc5656108c85e1d933f193c24b41aa0648ebc33afd79ed5f9a8887a27a2e50dddd8a12df9e67b7aba662b02f8a65e35b203cbf3677c3811c375806e9f41fb16482ce56b989b6f93eefed76b3ab17202a1e60e60b584ed3973"], 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) syz_open_procfs(0x0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0xa) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x1) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080ffffff7e) 17:45:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f000000", 0x17}, {&(0x7f0000013900)}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) read$char_usb(r4, 0x0, 0x0) sendfile(0xffffffffffffffff, r4, &(0x7f00000004c0)=0x100, 0x7ff) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000180)={0x0, 0x2}) r5 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r5, r3, 0x0, 0xa198) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, 0x0) sendfile(r2, r1, 0x0, 0xa198) 17:45:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)="004e53523033010000", 0x9, 0x8800}, {&(0x7f0000010300)="010003000b0001005c59f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e75785544460000000000", 0x66, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a3e2835002a4c696e75782055444646530000000000000000000000040500", 0xdf, 0x180c0}, {&(0x7f0000010500)="0000000000000000010000", 0xb, 0x181e0}, {&(0x7f0000010600)="06000300e2000100800ee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x5d, 0x18400}, {&(0x7f0000010700)="000000000000000000000000000000000000000900040000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000400001000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405000000000000", 0x70, 0x184c0}, {&(0x7f0000010800)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e010204050000000001000000100002003802000070000000f007", 0x4e, 0x185a0}, {&(0x7f0000010900)="050003002e0001003a98f001620000000500000001000000002b4e53523033000000000000000000000000000000000000000000000000000000000000000000000400000000", 0x46, 0x18800}, {&(0x7f0000010a00)="0000000000000000000000000000000000000000000000000400000010050000d0020000002a4c696e75782055444646530000000000000000000000040500", 0x3f, 0x188a0}, {0x0}, {&(0x7f0000011400)="020003003800010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}, {&(0x7f0000011600)="00010300380001001e14f001100000007810e4070913142c1a3e28350300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600", 0x7a, 0x148000}, {&(0x7f0000011700)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900040000300000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000004000020", 0xf5, 0x1480e0}, {&(0x7f0000011a00)="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", 0x1e0, 0x150000}, {&(0x7f0000011c00)="0a010300c400010080bb48013100000000000000040000000100000400000000000003000000000000000000a57c000001000000000000008000000000000000800000000000000000000000000000000010e4070913122c1b08224b0010e4070913122c1b08224b0010e4", 0x6b}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000013b00)) 17:45:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0x8) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 17:45:11 executing program 1: epoll_pwait(0xffffffffffffffff, &(0x7f0000000e80)=[{}], 0x1, 0x0, 0x0, 0x0) 17:45:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f000000", 0x17}, {&(0x7f0000013900)}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = signalfd(0xffffffffffffffff, 0x0, 0x0) read$char_usb(r4, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000004c0)=0x100, 0x7ff) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) unlinkat(r3, &(0x7f0000000080)='./file0/file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r5, r3, 0x0, 0xa198) sendfile(r2, r1, 0x0, 0xa198) [ 1316.806848][T20619] loop2: detected capacity change from 4096 to 0 [ 1316.814769][T20620] loop5: detected capacity change from 512 to 0 [ 1316.834137][T20620] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:45:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f000000", 0x17}, {&(0x7f0000013900)}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = signalfd(0xffffffffffffffff, 0x0, 0x0) read$char_usb(r4, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000004c0)=0x100, 0x7ff) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, 0x0) unlinkat(r3, &(0x7f0000000080)='./file0/file0\x00', 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r5, r3, 0x0, 0xa198) sendfile(r2, r1, 0x0, 0xa198) [ 1316.849785][T20619] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1316.850182][T20618] loop3: detected capacity change from 5376 to 0 [ 1316.888051][T20618] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1316.896586][T20618] UDF-fs: Scanning with blocksize 512 failed [ 1316.908496][T20618] UDF-fs: warning (device loop3): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount 17:45:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)="004e53523033010000", 0x9, 0x8800}, {&(0x7f0000010300)="010003000b0001005c59f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e75785544460000000000", 0x66, 0x18000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1a3e2835002a4c696e75782055444646530000000000000000000000040500", 0xdf, 0x180c0}, {&(0x7f0000010500)="0000000000000000010000", 0xb, 0x181e0}, {&(0x7f0000010600)="06000300e2000100800ee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x5d, 0x18400}, {&(0x7f0000010700)="000000000000000000000000000000000000000900040000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000400001000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405000000000000", 0x70, 0x184c0}, {&(0x7f0000010800)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e010204050000000001000000100002003802000070000000f007", 0x4e, 0x185a0}, {&(0x7f0000010900)="050003002e0001003a98f001620000000500000001000000002b4e53523033000000000000000000000000000000000000000000000000000000000000000000000400000000", 0x46, 0x18800}, {&(0x7f0000010a00)="0000000000000000000000000000000000000000000000000400000010050000d0020000002a4c696e75782055444646530000000000000000000000040500", 0x3f, 0x188a0}, {0x0}, {&(0x7f0000011400)="020003003800010077c9f00100010000004000006000000000400000e007", 0x1e, 0x40000}, {&(0x7f0000011600)="00010300380001001e14f001100000007810e4070913142c1a3e28350300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600", 0x7a, 0x148000}, {&(0x7f0000011700)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900040000300000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000004000020", 0xf5, 0x1480e0}, {&(0x7f0000011a00)="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", 0x1e0, 0x150000}, {&(0x7f0000011c00)="0a010300c400010080bb48013100000000000000040000000100000400000000000003000000000000000000a57c000001000000000000008000000000000000800000000000000000000000000000000010e4070913122c1b08224b0010e4070913122c1b08224b0010e4", 0x6b}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000013b00)) [ 1316.961556][T20636] loop1: detected capacity change from 4096 to 0 [ 1316.991094][T20636] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1317.147076][T20651] loop3: detected capacity change from 5376 to 0 [ 1317.274797][T20651] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1317.338685][T20651] UDF-fs: Scanning with blocksize 512 failed [ 1317.366535][T20651] UDF-fs: warning (device loop3): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount [ 1317.480537][T20649] ================================================================== [ 1317.488645][T20649] BUG: KCSAN: data-race in ext4_handle_inode_extension / generic_file_buffered_read [ 1317.498027][T20649] [ 1317.500356][T20649] write to 0xffff88800e020c10 of 8 bytes by task 20647 on cpu 0: [ 1317.508076][T20649] ext4_handle_inode_extension+0x226/0x550 [ 1317.513891][T20649] ext4_file_write_iter+0xeaa/0x1060 [ 1317.519186][T20649] do_iter_readv_writev+0x2cb/0x360 [ 1317.524394][T20649] do_iter_write+0x112/0x4c0 [ 1317.528986][T20649] vfs_iter_write+0x4c/0x70 [ 1317.533482][T20649] iter_file_splice_write+0x41a/0x770 [ 1317.538842][T20649] direct_splice_actor+0x80/0xa0 [ 1317.543762][T20649] splice_direct_to_actor+0x345/0x650 [ 1317.549114][T20649] do_splice_direct+0xf5/0x170 [ 1317.553858][T20649] do_sendfile+0x5e0/0xcf0 [ 1317.558256][T20649] __x64_sys_sendfile64+0xf2/0x130 [ 1317.563348][T20649] do_syscall_64+0x39/0x80 [ 1317.567749][T20649] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1317.573624][T20649] [ 1317.575926][T20649] read to 0xffff88800e020c10 of 8 bytes by task 20649 on cpu 1: [ 1317.583547][T20649] generic_file_buffered_read+0x290/0x9c0 [ 1317.589248][T20649] generic_file_read_iter+0x82/0x3e0 [ 1317.594527][T20649] ext4_file_read_iter+0x2e0/0x430 [ 1317.599628][T20649] generic_file_splice_read+0x22a/0x310 [ 1317.605167][T20649] splice_direct_to_actor+0x2aa/0x650 [ 1317.610544][T20649] do_splice_direct+0xf5/0x170 [ 1317.615297][T20649] do_sendfile+0x5e0/0xcf0 [ 1317.619696][T20649] __x64_sys_sendfile64+0xa9/0x130 [ 1317.624786][T20649] do_syscall_64+0x39/0x80 [ 1317.629186][T20649] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1317.635060][T20649] [ 1317.637377][T20649] Reported by Kernel Concurrency Sanitizer on: [ 1317.643502][T20649] CPU: 1 PID: 20649 Comm: syz-executor.4 Not tainted 5.11.0-rc6-syzkaller #0 [ 1317.652241][T20649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.662276][T20649] ================================================================== [ 1317.670311][T20649] Kernel panic - not syncing: panic_on_warn set ... [ 1317.676886][T20649] CPU: 1 PID: 20649 Comm: syz-executor.4 Not tainted 5.11.0-rc6-syzkaller #0 [ 1317.685623][T20649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.695658][T20649] Call Trace: [ 1317.698920][T20649] dump_stack+0x116/0x15d [ 1317.703239][T20649] panic+0x1e7/0x5fa [ 1317.707117][T20649] ? vprintk_emit+0x2e2/0x360 [ 1317.711780][T20649] kcsan_report+0x67b/0x680 [ 1317.716272][T20649] ? kcsan_setup_watchpoint+0x472/0x4d0 [ 1317.721937][T20649] ? generic_file_buffered_read+0x290/0x9c0 [ 1317.727826][T20649] ? generic_file_read_iter+0x82/0x3e0 [ 1317.733276][T20649] ? ext4_file_read_iter+0x2e0/0x430 [ 1317.738551][T20649] ? generic_file_splice_read+0x22a/0x310 [ 1317.744270][T20649] ? splice_direct_to_actor+0x2aa/0x650 [ 1317.749798][T20649] ? do_splice_direct+0xf5/0x170 [ 1317.754719][T20649] ? do_sendfile+0x5e0/0xcf0 [ 1317.759291][T20649] ? __x64_sys_sendfile64+0xa9/0x130 [ 1317.764567][T20649] ? do_syscall_64+0x39/0x80 [ 1317.769373][T20649] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1317.775447][T20649] ? generic_file_buffered_read_get_pages+0xa9e/0xaf0 [ 1317.782203][T20649] kcsan_setup_watchpoint+0x472/0x4d0 [ 1317.787574][T20649] generic_file_buffered_read+0x290/0x9c0 [ 1317.793308][T20649] ? ___cache_free+0x3c/0x2f0 [ 1317.797971][T20649] generic_file_read_iter+0x82/0x3e0 [ 1317.803243][T20649] ? aa_file_perm+0x132/0xde0 [ 1317.807905][T20649] ? iter_file_splice_write+0x6e8/0x770 [ 1317.813453][T20649] ext4_file_read_iter+0x2e0/0x430 [ 1317.818561][T20649] generic_file_splice_read+0x22a/0x310 [ 1317.824114][T20649] ? splice_shrink_spd+0x60/0x60 [ 1317.829036][T20649] splice_direct_to_actor+0x2aa/0x650 [ 1317.834394][T20649] ? do_splice_direct+0x170/0x170 [ 1317.839403][T20649] do_splice_direct+0xf5/0x170 [ 1317.844151][T20649] do_sendfile+0x5e0/0xcf0 [ 1317.848554][T20649] __x64_sys_sendfile64+0xa9/0x130 [ 1317.853647][T20649] do_syscall_64+0x39/0x80 [ 1317.858047][T20649] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1317.863923][T20649] RIP: 0033:0x465b09 [ 1317.867826][T20649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1317.887412][T20649] RSP: 002b:00007f3bf809d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1317.895805][T20649] RAX: ffffffffffffffda RBX: 000000000056c158 RCX: 0000000000465b09 [ 1317.903763][T20649] RDX: 0000000020000100 RSI: 0000000000000006 RDI: 0000000000000006 [ 1317.911716][T20649] RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 [ 1317.919682][T20649] R10: 00008080ffffff7e R11: 0000000000000246 R12: 000000000056c158 [ 1317.927633][T20649] R13: 00007ffcb3d3387f R14: 00007f3bf809d300 R15: 0000000000022000 [ 1317.936218][T20649] Kernel Offset: disabled [ 1317.940526][T20649] Rebooting in 86400 seconds..